Sciweavers

177 search results - page 21 / 36
» Overdetermined Elliptic Systems
Sort
View
ASIACRYPT
2001
Springer
14 years 1 days ago
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching publi...
Arjen K. Lenstra
COLING
1990
13 years 8 months ago
A Mechanism for ellipsis resolution in dialogued systems
: An ellipsis resolution mechanism is presented. The mechanism is a part of a Natural Language Understanding System developed in the last years in order to be included as a main co...
Arantza Díaz de Ilarraza Sánchez, H....
ASIACRYPT
2001
Springer
13 years 11 months ago
Short Signatures from the Weil Pairing
Abstract. We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyper-elliptic curves. The signature length is half the...
Dan Boneh, Ben Lynn, Hovav Shacham
CODES
2003
IEEE
14 years 25 days ago
Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and crypt
This paper describes a hardware-software co-design approach for flexible programmable Galois Field Processing for applications which require operations over GF(2m ), such as RS an...
Wei Ming Lim, Mohammed Benaissa
AMC
2005
123views more  AMC 2005»
13 years 7 months ago
Iterative methods for Robbins problems
Preconditioned iterative methods are described for the solution of an elliptic partial differential equation over an unit square region with Robbins boundary conditions. Transform...
Andy C. Ho, Michael K. Ng