XTR

Results: 836



#Item
391Ubiquitous computing / Wireless / N1 road / XTR / Technology / Telecommunications engineering / Finite fields / Automatic identification and data capture / Radio-frequency identification

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Wang Shao-hui1,2,3, Han Zhijie1,2, Liu Sujuan1,2, Chen Dan-wei1,2 {1.College of Computer, Nanjing University of Posts and Telecommunications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-09 07:48:21
392Finite fields / Cryptography / Group theory / Algebraic number theory / Weil pairing / XTR / Frobenius endomorphism / Supersingular elliptic curve / Pairing / Abstract algebra / Algebra / Elliptic curves

Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto1 , Hae Y. Kim1 , Ben Lynn2 , and Michael Scott3 1

Add to Reading List

Source URL: doras.dcu.ie

Language: English - Date: 2009-12-03 09:35:00
393Diffie–Hellman key exchange / Public-key cryptography / Diffie–Hellman problem / Decisional Diffie–Hellman assumption / XTR / Internet Key Exchange / Commitment scheme / Cryptography / Cryptographic protocols / Universal composability

Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz, J¨orn M¨ uller-Quade, and Rainer Steinwandt IAKS, Arbeitsgruppe Systemsicherheit, Prof. Dr. Th. Beth, Fakult¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-25 06:20:23
394Finite fields / Computational hardness assumptions / Cryptographic protocols / Group theory / Diffie–Hellman problem / XTR / Index calculus algorithm / Diffie–Hellman key exchange / Random oracle / Cryptography / Abstract algebra / Mathematics

ANOTHER LOOK AT NON-STANDARD DISCRETE LOG AND DIFFIE-HELLMAN PROBLEMS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We examine several versions of the one-more-discrete-log and one-more-Diffie-Hellman problems. In attempting

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-09-21 19:02:16
395Polynomial / Permutation polynomial / Mathematics / Symmetric-key algorithm / XTR

Journal of Electronic Imaging 15(4), [removed]Oct–Dec[removed]Cryptanalysis of an image encryption scheme Shujun Li* The Hong Kong Polytechnic University Department of Electronic and Information Engineering

Add to Reading List

Source URL: repository.lib.polyu.edu.hk

Language: English - Date: 2014-12-02 23:40:51
396NP-complete problems / Radar / Minimum spanning tree / Spanning tree / Algorithm / Vertex cover / Transmitter / XTR / Dynamic programming / Mathematics / Theoretical computer science / Computational complexity theory

Power Assignment in Radio Networks with Two Power Levels∗ Paz Carmi Matthew J. Katz

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2007-06-01 03:44:41
397Internet Key Exchange / Diffie–Hellman key exchange / Elliptic curve cryptography / Hellman / Key size / Request for Comments / XTR / Oakley protocol / Cryptography / Cryptographic protocols / Finite fields

Internet Engineering Task Force (IETF) Request for Comments: 5903 Obsoletes: 4753 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-11 19:22:25
398Probability and statistics / Crowdsourcing / PageRank / Reputation management / Search engine optimization / HITS algorithm / Random walk / Markov chain / XTR / Statistics / Markov models / Link analysis

What is this Page Known for? Computing Web Page Reputations Davood Ra ei Department of Computer Science University of Toronto dra ei@cs.toronto.edu

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2011-12-04 14:11:43
399Key management / Cryptographic protocols / Digital signature / XTR / ElGamal encryption / Group signature / RSA / Public key certificate / Proof of knowledge / Cryptography / Public-key cryptography / Electronic commerce

Efficient Group Signatures without Trapdoors? Giuseppe Ateniese and Breno de Medeiros The Johns Hopkins University Department of Computer Science Baltimore, MD 21218, USA [removed], [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
400Finite fields / Electronic commerce / Paillier cryptosystem / Okamoto–Uchiyama cryptosystem / Goldwasser–Micali cryptosystem / XTR / ElGamal encryption / Diffie–Hellman problem / RSA / Cryptography / Public-key cryptography / Computational hardness assumptions

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications Emmanuel Bresson1 , Dario Catalano2 , and David Pointcheval2 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
UPDATE