Sciweavers

171 search results - page 10 / 35
» Braid Group Cryptography
Sort
View
DCC
2001
IEEE
14 years 9 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
13 years 9 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
ACNS
2003
Springer
156views Cryptology» more  ACNS 2003»
14 years 1 months ago
An Efficient Tree-Based Group Key Agreement Using Bilinear Map
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challeng...
Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu
IJSNET
2008
118views more  IJSNET 2008»
13 years 9 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
13 years 8 months ago
Peristaltic locomotion with antagonistic actuators in soft robotics
— This paper presents a soft robotic platform that exhibits peristaltic locomotion. The design principle is based on the unique antagonistic arrangement of radial/circular and lo...
Sangok Seok, Cagdas Denizel Onal, Robert J. Wood, ...