Sciweavers

1769 search results - page 46 / 354
» Cryptography
Sort
View
ACSC
2006
IEEE
15 years 3 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
ESCIENCE
2005
IEEE
15 years 3 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
IWANN
2001
Springer
15 years 2 months ago
The General Neural-Network Paradigm for Visual Cryptography
This paper proposes the general paradigm to build Q'tron neural networks (NNs) for visual cryptography. Given a visual encryption scheme, usually described using an access st...
Tai-Wen Yue, Suchen Chiang
FDL
2007
IEEE
15 years 1 months ago
A Domain Specific Language for Cryptography
In this paper, we propose a domain specific language for the development of hardware/software cryptographic systems based on the well known Python programming language. It is desi...
Giovanni Agosta, Gerardo Pelosi
ANTS
2006
Springer
101views Algorithms» more  ANTS 2006»
15 years 1 months ago
High Security Pairing-Based Cryptography Revisited
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We ...
Robert Granger, Dan Page, Nigel P. Smart