Sciweavers

954 search results - page 110 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
ECUMN
2007
Springer
15 years 1 months ago
Improved User Identity Confidentiality for UMTS Mobile Networks
In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such s...
Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern
ACNS
2003
Springer
156views Cryptology» more  ACNS 2003»
15 years 1 months ago
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challeng...
Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu
FCS
2006
14 years 11 months ago
Quantum Oblivious Transfer Based on POVM Measurements
- Oblivious transfer OT is an important primitive in cryptography. In chosen one-out-of-two OT, Alice offers two bits, one of which Bob can choose to read, not learning any informa...
Wei Yang, Liusheng Huang, Yonglong Luo, Mingjun Xi...
FCS
2006
14 years 11 months ago
Quantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Us...