Sciweavers

1195 search results - page 25 / 239
» New constructions of SSPDs and their applications
Sort
View
ISW
1997
Springer
15 years 3 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
GEOINFO
2007
15 years 1 months ago
The Development of a Large Scale Geospatial Telecommunications Application Independent from GIS
This article presents the evolution of a very large geospatial database and application developed for telecommunications outside plant management. The needs for the construction of...
Eliane Z. Victorelli Dias, Geovane Cayres Magalh&a...
ASIACRYPT
2006
Springer
15 years 3 months ago
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we...
Christophe De Cannière, Christian Rechberge...
ASIACRYPT
2006
Springer
15 years 3 months ago
The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography
Abstract. The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suit...
Pierrick Gaudry, T. Houtmann, D. Kohel, Christophe...
VLDB
2003
ACM
172views Database» more  VLDB 2003»
16 years 2 days ago
Aurora: a new model and architecture for data stream management
This paper describes the basic processing model and architecture of Aurora, a new system to manage data streams for monitoring applications. Monitoring applications differ substant...
Daniel J. Abadi, Donald Carney, Ugur Çetintemel, ...