Sciweavers

625 search results - page 30 / 125
» Generalized Ring Signatures
Sort
View
IACR
2011
124views more  IACR 2011»
12 years 7 months ago
Group Law Computations on Jacobians of Hyperelliptic Curves
We derive an explicit method of computing the composition step in Cantor’s algorithm for group operations on Jacobians of hyperelliptic curves. Our technique is inspired by the g...
Craig Costello, Kristin Lauter
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
13 years 8 months ago
Behavior-based speciation for evolutionary robotics
This paper describes a speciation method that allows an evolutionary process to learn several robot behaviors using a single execution. Species are created in behavioral space in ...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
CIKM
2005
Springer
14 years 1 months ago
Rotation invariant indexing of shapes and line drawings
We present data representations, distance measures and organizational structures for fast and efficient retrieval of similar shapes in image databases. Using the Hough Transform w...
Michail Vlachos, Zografoula Vagena, Philip S. Yu, ...
NDSS
1998
IEEE
13 years 11 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
ACMSE
2009
ACM
13 years 5 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo