Sciweavers

1834 search results - page 104 / 367
» Public Key Cryptography
Sort
View
135
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 3 months ago
Quantum Three-Pass protocol: Key distribution using quantum superposition states
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a phot...
Yoshito Kanamori, Seong-Moo Yoo
131
Voted
RIVF
2008
15 years 5 months ago
Quantum key distribution system using dual-threshold homodyne detection
In this work we present the principles of a flexible quantum key distribution (QKD) system using quadraturephase-shift-keying (QPSK) base and symbol encoding and dualthreshold bala...
Qing Xu 0006, Manuel Sabban, Philippe Gallion, Fra...
118
Voted
PKC
2007
Springer
132views Cryptology» more  PKC 2007»
15 years 9 months ago
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Abstract. We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
120
Voted
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 8 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
127
Voted
COMCOM
2000
143views more  COMCOM 2000»
15 years 3 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou