Sciweavers

CRYPTO
1995
Springer
91views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Some Remarks on Lucas-Based Cryptosystems
We review the well-known relation between Lucas sequences and exponentiation. This leads to the observation that certain public-key cryptosystems that are based on the use of Lucas...
Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstr...
CRYPTO
1995
Springer
101views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Robustness Principles for Public Key Protocols
Abstract: We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help at...
Ross J. Anderson, Roger M. Needham
TYPES
2000
Springer
15 years 7 months ago
Collection Principles in Dependent Type Theory
We introduce logic-enriched intuitionistic type theories, that extend intuitionistic dependent type theories with primitive judgements to express logic. By adding type theoretic ru...
Peter Aczel, Nicola Gambino
CRYPTO
1995
Springer
93views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
Mihir Bellare, Roch Guérin, Phillip Rogaway
TSDM
2000
189views Data Mining» more  TSDM 2000»
15 years 7 months ago
Join Indices as a Tool for Spatial Data Mining
The growing production of maps is generating huge volume of data stored in large spatial databases. This huge volume of data exceeds the human analysis capabilities. Spatial data m...
Karine Zeitouni, Laurent Yeh, Marie-Aude Aufaure