Sciweavers

185 search results - page 17 / 37
» A Lattice-Based Public-Key Cryptosystem
Sort
View
ACNS
2009
Springer
114views Cryptology» more  ACNS 2009»
14 years 4 months ago
Broadcast Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo
ICISC
2007
125views Cryptology» more  ICISC 2007»
13 years 11 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
SIAMCOMP
2008
103views more  SIAMCOMP 2008»
13 years 9 months ago
Compression in Finite Fields and Torus-Based Cryptography
Abstract. We present efficient compression algorithms for subgroups of multiplicative groups of finite fields, we use our compression algorithms to construct efficient public key c...
Karl Rubin, Alice Silverberg
COMCOM
2011
13 years 4 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
DCC
2000
IEEE
13 years 9 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko