Sciweavers

117 search results - page 13 / 24
» A Comparison of Cryptography Courses
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
ARITH
1999
IEEE
14 years 25 days ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter
IJCCBS
2010
146views more  IJCCBS 2010»
13 years 7 months ago
A meta-level true random number generator
: True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. In this work, we introduce, extend and analyse the concept of the randomis...
Bernhard Fechner, Andre Osterloh
JDCTA
2010
250views more  JDCTA 2010»
13 years 3 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
CE
2008
95views more  CE 2008»
13 years 8 months ago
Enabling teachers to explore grade patterns to identify individual needs and promote fairer student assessment
Exploring student test, homework, and other assessment scores is a challenge for most teachers, especially when attempting to identify cross-assessment weaknesses and produce fina...
Sorelle A. Friedler, Yee Lin Tan, Nir J. Peer, Ben...