Sciweavers

78 search results - page 9 / 16
» New Public-Key Cryptosystem Using Braid Groups
Sort
View
EUROCRYPT
2000
Springer
14 years 2 months ago
A NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Éliane Jaulmes, Antoine Joux
WISEC
2009
ACM
14 years 5 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
LATINCRYPT
2010
13 years 9 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 10 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
JSC
2007
61views more  JSC 2007»
13 years 10 months ago
Set-theoretic solutions of the Yang-Baxter equation, graphs and computations
Abstract. We extend our recent work on set-theoretic solutions of the YangBaxter or braid relations with new results about their automorphism groups, strong twisted unions of solut...
Tatiana Gateva-Ivanova, Shahn Majid