Sciweavers

AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
14 years 9 months ago
Computing Hypergeometric Solutions of Linear Recurrence Equations
We describe a complete algorithm to compute the hypergeometric solutions of linear recurrence relations with rational function coefficients. We use the notion of finite singularit...
Thomas Cluzeau, Mark van Hoeij
AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
15 years 3 months ago
Applying Fujisaki-Okamoto to Identity-Based Encryption
The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), t...
Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka...
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
14 years 9 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
14 years 9 months ago
The Berlekamp-Massey Algorithm revisited
We propose a slight modification of the Berlekamp-Massey Algorithm for obtaining the minimal polynomial of a given linearly recurrent sequence. Such a modification enables to expl...
Nadia Ben Atti, Gema M. Diaz-Toca, Henri Lombardi
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
14 years 9 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
Algorithms
Top of PageReset Settings