Sciweavers

67 search results - page 9 / 14
» rsa 2010
Sort
View
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
14 years 6 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
RSA
2010
94views more  RSA 2010»
14 years 7 months ago
Word maps and spectra of random graph lifts
We study here the spectra of random lifts of graphs. Let G be a finite connected graph, and let the infinite tree T be its universal cover space. If λ1 and ρ are the spectral ...
Nati Linial, Doron Puder
RSA
2010
107views more  RSA 2010»
14 years 7 months ago
Continuum limits for classical sequential growth models
A random graph order, also known as a transitive percolation process, is defined by taking a random graph on the vertex set {0, . . . , n − 1}, and putting i below j if there i...
Graham Brightwell, Nicholas Georgiou
84
Voted
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
14 years 6 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu
STACS
2010
Springer
15 years 4 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern