Sciweavers

14 search results - page 1 / 3
» ima 2009
Sort
View
IMA
2009
Springer
149views Cryptology» more  IMA 2009»
13 years 11 months ago
Practical Zero-Knowledge Proofs for Circuit Evaluation
Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi
IMA
2009
Springer
132views Cryptology» more  IMA 2009»
13 years 11 months ago
Subspace Codes
Abstract. This paper is a survey of bounds and constructions for subspace codes designed for the injection metric, a distance measure that arises in the context of correcting adver...
Azadeh Khaleghi, Danilo Silva, Frank R. Kschischan...
IMA
2009
Springer
145views Cryptology» more  IMA 2009»
13 years 11 months ago
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions
Let f : F n 2 → F n 2 be an almost perfect nonlinear function (APN). The set Df := {(a, b) : f(x + a) − f(x) = b has two solutions} can be used to distinguish APN functions up ...
Yves Edel, Alexander Pott
IMA
2009
Springer
131views Cryptology» more  IMA 2009»
13 years 11 months ago
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Gaudry and Schost gave a low-memory algorithm for solving the 2-dimensional discrete logarithm problem. We present an improvement to their algorithm and extend this improvement to ...
Steven D. Galbraith, Raminder S. Ruprai