Sciweavers

3 search results - page 1 / 1
» Security Analysis of Asymmetric Cipher Protocol Based on Mat...
Sort
View
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
13 years 3 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
ICIAP
2005
ACM
14 years 4 months ago
Asymmetric 3D/2D Processing: A Novel Approach for Face Recognition
Facial image analysis is very useful in many applications such as video compression, talking heads, or biometrics. During the last few years, many algorithms have been proposed in ...
Daniel Riccio, Jean-Luc Dugelay
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
13 years 10 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov