Sciweavers

362 search results - page 24 / 73
» Abstraction in Cryptography
Sort
View
ISSAC
1992
Springer
114views Mathematics» more  ISSAC 1992»
15 years 3 months ago
Parallel Lattice Basis Reduction
Abstract. Lattice basis reduction is an important problem in geometry of numbers with applications in combinatorial optimization, computer algebra, and cryptography. The well-known...
Gilles Villard
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
15 years 3 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
ASIACRYPT
2006
Springer
15 years 2 months ago
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
Abstract. To prove or disprove the computational equivalence of solving the RSA problem and factoring integers is a longstanding open problem in cryptography. This paper provides s...
Gregor Leander, Andy Rupp
PST
2004
15 years 12 days ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
JNW
2008
103views more  JNW 2008»
14 years 11 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette