Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
We show that unseen words account for a large part of the translation error when moving to new domains. Using an extension of a recent approach to mining translations from compara...
Sound symbolism is the non-arbitrary link between the sound of a word and its meaning. Imai et al. (2008) showed that Japanese speaking children benefited from the presence of sou...
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...