Sciweavers

1769 search results - page 22 / 354
» Cryptography
Sort
View
EUROCRYPT
2003
Springer
15 years 2 months ago
Provably Secure Threshold Password-Authenticated Key Exchange
Mario Di Raimondo, Rosario Gennaro
CRYPTOLOGIA
2006
67views more  CRYPTOLOGIA 2006»
14 years 9 months ago
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition ...
Joshua Holden, Richard Layton, Laurence D. Merkle,...
JNW
2006
174views more  JNW 2006»
14 years 9 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
JUCS
2006
137views more  JUCS 2006»
14 years 9 months ago
Progress in Quantum Computational Cryptography
: Shor's algorithms for the integer factorization and the discrete logarithm problems can be regarded as a negative effect of the quantum mechanism on publickey cryptography. ...
Akinori Kawachi, Takeshi Koshiba
IPPS
2003
IEEE
15 years 2 months ago
Secret Key Cryptography with Cellular Automata
The paper presents new results concerning application of cellular automata (CAs) to the secret key cryptography
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...