Sciweavers

7 search results - page 1 / 2
» ima 1999
Sort
View
IMA
1999
Springer
73views Cryptology» more  IMA 1999»
13 years 9 months ago
A Cryptographic Application of Weil Descent
Steven D. Galbraith, Nigel P. Smart
IMA
1999
Springer
79views Cryptology» more  IMA 1999»
13 years 9 months ago
Enhanced Image Coding for Noisy Channels
Paul Chippendale, Cagri Tanriover, Bahram Honary
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
13 years 9 months ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
13 years 9 months ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov