Sciweavers

147 search results - page 21 / 30
» Logarithmic keying
Sort
View
EUROCRYPT
2001
Springer
14 years 2 months ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
EUROCRYPT
1998
Springer
14 years 2 months ago
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption
We introduce a new cryptosystem with trapdoor decryption based on the di culty of computing discrete logarithms in the class group of the non-maximal imaginary quadratic order O q ...
Detlef Hühnlein, Michael J. Jacobson Jr., Sac...
PODC
1991
ACM
14 years 1 months ago
Resource Bounds for Self Stabilizing Message Driven Protocols
Abstract. Self-stabilizing message driven protocols are defined and discussed. The class weakexclusion that contains many natural tasks such as -exclusion and token-passing is de...
Shlomi Dolev, Amos Israeli, Shlomo Moran
ICASSP
2010
IEEE
13 years 10 months ago
Multiantenna spectrum sensing: Detection of spatial correlation among time-series with unknown spectra
One of the key problems in cognitive radio (CR) is the detection of primary activity in order to determine which parts of the spectrum are available for opportunistic access. This...
David Ramírez, Javier Vía, Ignacio S...
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 10 months ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler