Sciweavers

IMA
2003
Springer
125views Cryptology» more  IMA 2003»
13 years 9 months ago
Commitment Capacity of Discrete Memoryless Channels
In extension of the bit commitment task and following work initiated by Crépeau and Kilian, we introduce and solve the problem of characterising the optimal rate at which a discr...
Andreas Winter, Anderson C. A. Nascimento, Hideki ...
IMA
2003
Springer
69views Cryptology» more  IMA 2003»
13 years 9 months ago
Separating and Intersecting Properties of BCH and Kasami Codes
Hans Georg Schaathun, Tor Helleseth
IMA
2003
Springer
97views Cryptology» more  IMA 2003»
13 years 9 months ago
Remote User Authentication Using Public Information
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only sym...
Chris J. Mitchell
IMA
2003
Springer
114views Cryptology» more  IMA 2003»
13 years 9 months ago
A Designer's Guide to KEMs
Alexander W. Dent