Sciweavers

954 search results - page 111 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
14 years 10 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
14 years 9 months ago
An Electronic Cash System Based on Group Blind Signatures
One important requirement of electronic cash systems is the anonymity of customers. Unconditional anonymity is also very well suited to support criminals in blackmailing. Maitland ...
Constantin Popescu
JOC
2002
76views more  JOC 2002»
14 years 9 months ago
A Note on Negligible Functions
In theoretical cryptography, one formalizes the notion of an adversary's success probability being "too small to matter" by asking that it be a negligible function ...
Mihir Bellare
STORAGESS
2006
ACM
15 years 3 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller