Sciweavers

1769 search results - page 153 / 354
» Cryptography
Sort
View
106
Voted
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
15 years 3 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
109
Voted
IPL
2002
60views more  IPL 2002»
15 years 3 months ago
s-partitions
This note reports on the number of s-partitions of a natural number n. In an s-partition of n each cell has the form 2k - 1 for some integer k. Such partitions have potential appl...
William M. Y. Goh, Pawel Hitczenko, Ali Shokoufand...
129
Voted
RFIDSEC
2010
15 years 1 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
IMCSIT
2010
15 years 1 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
139
Voted
INDOCRYPT
2010
Springer
15 years 1 months ago
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of th...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...