Sciweavers

107 search results - page 1 / 22
» Some Applications of Bounds for Designs to the Cryptography
Sort
View
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
13 years 9 months ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov
ASIACRYPT
2009
Springer
13 years 11 months ago
Security Bounds for the Design of Code-Based Cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Matthieu Finiasz, Nicolas Sendrier
FIWAC
1993
153views Cryptology» more  FIWAC 1993»
13 years 9 months ago
New lower bounds for some spherical designs
A new method for obtaining lower bounds for spherical t-designs is proposed. Applications and new bounds are given for t = 9, 10. Some restrictions on the distribution of the inne...
Peter Boyvalenkov, Svetla Nikova
BMCBI
2006
141views more  BMCBI 2006»
13 years 4 months ago
Maximum common subgraph: some upper bound and lower bound results
Background: Structure matching plays an important part in understanding the functional role of biological structures. Bioinformatics assists in this effort by reformulating this p...
Xiuzhen Huang, Jing Lai, Steven F. Jennings
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs