Sciweavers

1769 search results - page 56 / 354
» Cryptography
Sort
View
128
Voted
DCC
2001
IEEE
16 years 2 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
123
Voted
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
16 years 17 hour ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson
143
Voted
ICS
2010
Tsinghua U.
16 years 12 hour ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
92
Voted
ISSEP
2010
Springer
217views Education» more  ISSEP 2010»
15 years 11 months ago
Teaching Public-Key Cryptography in School
Lucia Keller, Dennis Komm, Giovanni Serafini, Andr...
IEEEARES
2010
IEEE
15 years 9 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz