Sciweavers

954 search results - page 145 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
RIVF
2007
14 years 11 months ago
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-...
Qing Xu 0006, M. B. C. Silva, Jean-Luc Danger, Syl...
WCE
2007
14 years 11 months ago
A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship
—Digital watermarking is a technique for protecting intellectual property of digital information. However, when a work is created by multiple authors, digital watermarking may su...
Shu-Fen Tu, Ching-Sheng Hsu
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
CORR
2008
Springer
181views Education» more  CORR 2008»
14 years 9 months ago
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks
The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational f...
Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee
CORR
2006
Springer
182views Education» more  CORR 2006»
14 years 9 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal