Sciweavers

1769 search results - page 84 / 354
» Cryptography
Sort
View
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
13 years 7 days ago
Multi-instance Security and Its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 6 days ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
IJNSEC
2010
144views more  IJNSEC 2010»
14 years 4 months ago
A Note On Self-Shrinking Lagged Fibonacci Generator
Lagged Fibonacci Generators (LFG) are used as a building block of key-streamgenerator in stream cipher cryptography. In this note we have used the self-shrinkingconcept in LFG and ...
Moon K. Chetry, W. B. Vasantha Kandaswamy