Sciweavers

700 search results - page 102 / 140
» words 2005
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 3 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
AIED
2005
Springer
15 years 3 months ago
Motivating Appropriate Challenges in a Reciprocal Tutoring System
Abstract. Formalizing a student model for an educational system requires an engineering effort that is highly domain-specific. This model-specificity limits the ability to scale ...
Ari Bader-Natal, Jordan B. Pollack
ASIACRYPT
2005
Springer
15 years 3 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
71
Voted
CALCO
2005
Springer
105views Mathematics» more  CALCO 2005»
15 years 3 months ago
Bisimilarity Is Not Finitely Based over BPA with Interrupt
This paper shows that bisimulation equivalence does not afford a finite equational axiomatization over the language obtained by enriching Bergstra and Klop’s Basic Process Alge...
Luca Aceto, Wan Fokkink, Anna Ingólfsd&oacu...
CHES
2005
Springer
107views Cryptology» more  CHES 2005»
15 years 3 months ago
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis
We describe a new variant of the well known Baby-Step Giant-Step algorithm in the case of some discrete logarithms with a special structure. More precisely, we focus on discrete lo...
Jean-Sébastien Coron, David Lefranc, Guilla...