Sciweavers

2414 search results - page 12 / 483
» Computing Normal Subgroups
Sort
View
EUROCRYPT
2004
Springer
13 years 11 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
NGC
2000
Springer
115views Communications» more  NGC 2000»
13 years 11 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi
IJAC
2010
67views more  IJAC 2010»
13 years 6 months ago
On Fox Quotients of Arbitrary Group Algebras
For a group G and N-series G of G let In R,G(G), n ≥ 0, denote the filtration of the group algebra R(G) induced by G , and IR(G) its augmentation ideal. For subgroups H of G, l...
Manfred Hartl
ICALP
2009
Springer
14 years 7 months ago
Factoring Groups Efficiently
We give a polynomial time algorithm that computes a decomposition of a finite group G given in the form of its multiplication table. That is, given G, the algorithm outputs two su...
Neeraj Kayal, Timur Nezhmetdinov
GCC
2003
Springer
14 years 21 days ago
Some Conclusions on Cayley Digraphs and Their Applications to Interconnection Networks
Abstract. In this short communication, we survey the relationships between Cayley digraphs and their subgraphs and coset graphs with respect to subgroups and obtain some general re...
Wenjun Xiao, Behrooz Parhami