Sciweavers

1769 search results - page 201 / 354
» Cryptography
Sort
View
128
Voted
EVOW
2006
Springer
15 years 7 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
165
Voted
AAECC
2003
Springer
165views Algorithms» more  AAECC 2003»
15 years 7 months ago
Fast Point Multiplication on Elliptic Curves through Isogenies
Elliptic curve cryptosystems are usually implemented over fields of characteristic two or over (large) prime fields. For large prime fields, projective coordinates are more suitabl...
Eric Brier, Marc Joye
161
Voted
ACNS
2003
Springer
156views Cryptology» more  ACNS 2003»
15 years 7 months ago
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challeng...
Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu
ARITH
2001
IEEE
15 years 7 months ago
The Use of the Multi-Dimensional Logarithmic Number System in DSP Applications
A recently introduced double-base number representation has proved to be successful in optimizing the performance of several algorithms in cryptography and digital signal processi...
Vassil S. Dimitrov, Jonathan Eskritt, Laurent Imbe...
EUROCRYPT
2000
Springer
15 years 7 months ago
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model
We show that if any one-way function exists, then 3-round concurrent zero-knowledge arguments for all NP problems can be built in a model where a short auxiliary string with a pres...
Ivan Damgård