Sciweavers

954 search results - page 127 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
EUROCRYPT
2006
Springer
15 years 1 months ago
The Function Field Sieve in the Medium Prime Case
In this paper, we study the application of the function field sieve algorithm for computing discrete logarithms over finite fields of the form Fqn when q is a medium-sized prime po...
Antoine Joux, Reynald Lercier
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 10 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
WINET
2010
179views more  WINET 2010»
14 years 8 months ago
Achieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security thre...
Haodong Wang, Qun Li
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 7 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
JSS
2011
106views more  JSS 2011»
14 years 21 days ago
A family of implementation-friendly BN elliptic curves
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in the academic community. This is especially due to the high level of security it p...
C. C. F. Pereira Geovandro, Marcos A. Simplí...