Sciweavers

12 search results - page 1 / 3
» acisp 2009
Sort
View
ACISP
2009
Springer
13 years 11 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
ACISP
2009
Springer
13 years 9 months ago
Random Order m-ary Exponentiation
This paper describes a m-ary exponentiation algorithm where the radix-m digits of an exponent can be treated in a somewhat random order without using any more group operations than...
Michael Tunstall
ACISP
2009
Springer
13 years 11 months ago
Jacobi Quartic Curves Revisited
This paper provides new results about efficient arithmetic on (extended) Jacobi quartic form elliptic curves y2 = dx4 + 2ax2
Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Car...
ACISP
2009
Springer
13 years 8 months ago
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
Abstract. We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been...
Ahto Buldas, Aivo Jürgenson, Margus Niitsoo