Sciweavers

507 search results - page 31 / 102
» The XTR Public Key System
Sort
View
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 3 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 3 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
ESORICS
2008
Springer
14 years 11 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
DGO
2003
129views Education» more  DGO 2003»
14 years 11 months ago
Scientist, Politician, and Bureaucrat Subcultures as Barriers to Information-Sharing in Government Agencies
This paper is based on an exploratory, interdisciplinary study of issues related to information-sharing within and across three public agencies. We build on Schein’s (1996) work...
David B. Drake, Marianne J. Koch, Nicole Steckler
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern