Sciweavers

4340 search results - page 10 / 868
» Formal Methods and Cryptography
Sort
View
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
14 years 6 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
CMA
2010
183views more  CMA 2010»
14 years 8 months ago
Ramanujan's class invariants and their use in elliptic curve cryptography
Complex Multiplication (CM) method is a frequently used method for the generation of elliptic curves (ECs) over a prime field Fp. The most demanding and complex step of this metho...
Elisavet Konstantinou, Aristides Kontogeorgis
JCP
2008
161views more  JCP 2008»
14 years 11 months ago
Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding
Multi-pixel encoding is an emerging method in visual cryptography for that it can encode more than one pixel for each encoding run. Nevertheless, in fact its encoding efficiency is...
Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Hua...
119
Voted
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 3 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
WAIFI
2010
Springer
194views Mathematics» more  WAIFI 2010»
15 years 4 months ago
Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
A cryptographic pairing evaluates as an element of a finite extension field, and the evaluation itself involves a considerable amount of extension field arithmetic. It is recogn...
Naomi Benger, Michael Scott