Sciweavers

1769 search results - page 76 / 354
» Cryptography
Sort
View
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
14 years 10 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
ADT
2006
14 years 10 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
CORR
2006
Springer
68views Education» more  CORR 2006»
14 years 9 months ago
Using shifted conjugacy in braid-based cryptography
Abstract. Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we describe a Fiat
Patrick Dehornoy
IEEESP
2006
47views more  IEEESP 2006»
14 years 9 months ago
Randomness in Cryptography
Rosario Gennaro
CORR
2007
Springer
114views Education» more  CORR 2007»
14 years 9 months ago
SECOQC White Paper on Quantum Key Distribution and Cryptography
Romain Alleaume, Jan Bouda, Cyril Branciard, Thier...