Sciweavers

1769 search results - page 56 / 354
» Cryptography
Sort
View
DCC
2001
IEEE
15 years 9 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
15 years 7 months ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson
ICS
2010
Tsinghua U.
15 years 7 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ISSEP
2010
Springer
217views Education» more  ISSEP 2010»
15 years 6 months ago
Teaching Public-Key Cryptography in School
Lucia Keller, Dennis Komm, Giovanni Serafini, Andr...
IEEEARES
2010
IEEE
15 years 4 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz