Sciweavers

1769 search results - page 115 / 354
» Cryptography
Sort
View
ICISC
2004
99views Cryptology» more  ICISC 2004»
15 years 4 months ago
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation
Abstract. This paper extends results concerning efficient exponentiation in groups where inversion is easy (e.g. in elliptic curve cryptography). It examines the right-to-left and ...
Bodo Möller
CORR
2010
Springer
368views Education» more  CORR 2010»
15 years 3 months ago
Quasigroups in cryptology
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Crypto...
V. A. Shcherbacov
123
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 3 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Divisibility, Smoothness and Cryptographic Applications
This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and crypto...
David Naccache, Igor Shparlinski
FFA
2006
77views more  FFA 2006»
15 years 3 months ago
Linear error-block codes
A linear error-block code is a natural generalization of the classical error-correcting code and has applications in experimental design, high-dimensional numerical integration an...
Keqin Feng, Lanju Xu, Fred J. Hickernell