Sciweavers

Share
DCC
2016
IEEE
3 years 1 months ago
A new family of tight sets in Q+(5, q)
In this paper, we describe a new infinite family of q2 −1 2 -tight sets in the hyperbolic quadrics Q+ (5, q), for q ≡ 5 or 9 mod 12. Under the Klein correspondence, these cor...
Jan De Beule, Jeroen Demeyer, Klaus Metsch, Morgan...
DCC
2016
IEEE
3 years 1 months ago
Cryptocash, cryptocurrencies, and cryptocontracts
Abstract. One of the central challenges for mathematical cryptography is to create a payment system that provides the advantages of cash in a digital world. In this expository arti...
Neal Koblitz, Alfred J. Menezes
DCC
2016
IEEE
3 years 1 months ago
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline...
Anne Broadbent, Christian Schaffner
DCC
2016
IEEE
3 years 1 months ago
Exceptional planar polynomials
Planar functions are special functions from a finite field to itself that give rise to finite projective planes and other combinatorial objects. We consider polynomials over a ...
Florian Caullery, Kai-Uwe Schmidt, Yue Zhou
DCC
2016
IEEE
3 years 1 months ago
Generic constructions of integrated PKE and PEKS
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE-PEKS as shorthand). We first fo...
Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang
DCC
2016
IEEE
3 years 1 months ago
Self-updatable encryption with short public parameters and its extensions
Cloud storage is very popular since it has many advantages, but there is a new threat to cloud storage that was not considered before. Self-updatable encryption that updates a pas...
Kwangsu Lee
DCC
2016
IEEE
3 years 1 months ago
Recent progress on the elliptic curve discrete logarithm problem
We survey recent work on the elliptic curve discrete logarithm problem. In particular we review index calculus algorithms using summation polynomials, and claims about their comple...
Steven D. Galbraith, Pierrick Gaudry
DCC
2016
IEEE
3 years 1 months ago
On the automorphisms of order 15 for a binary self-dual [96, 48, 20] code
The structure of binary self-dual codes invariant under the action of a cyclic group of order pq for odd primes p ̸= q is considered. As an application we prove the nonexistence ...
Stefka Bouyuklieva, Wolfgang Willems, Nikolay Yank...
DCC
2016
IEEE
3 years 1 months ago
Structural cryptanalysis of McEliece schemes with compact keys
A very popular trend in code-based cryptography is to decrease the public-key size by focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix, typi...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
DCC
2016
IEEE
3 years 1 months ago
A survey of the multiplier conjecture
We review the current status of the multiplier conjecture for difference sets, present some new results on it, and determine the open cases of the conjecture for abelian groups of...
Daniel M. Gordon, Bernhard Schmidt
books