Sciweavers

180 search results - page 14 / 36
» Discrete Logarithm Based Protocols
Sort
View
WSC
2008
14 years 12 months ago
A methodology for unit testing actors in proprietary discrete event based simulations
CT This paper presents a dependency injection based, unit testing methodology for unit testing components, or actors, involved in discrete event based computer network simulation v...
Mark E. Coyne, Scott R. Graham, Kenneth M. Hopkins...
71
Voted
FC
2010
Springer
230views Cryptology» more  FC 2010»
15 years 1 months ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
ANTS
2004
Springer
121views Algorithms» more  ANTS 2004»
15 years 3 months ago
Function Field Sieve in Characteristic Three
In this paper we investigate the efficiency of the function field sieve to compute discrete logarithms in the finite fields F3n . Motivated by attacks on identity based encrypti...
Robert Granger, Andrew J. Holt, Dan Page, Nigel P....
JOC
2000
181views more  JOC 2000»
14 years 9 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 4 months ago
Price Negotiation Systems for M-commerce
— As content delivery to wireless devices becomes faster and scalable, it is likely that mobile commerce will constitute a significant portion of digital commerce. In markets, b...
Huafei Zhu, Feng Bao, A. Lakshminarayanan