Sciweavers

488 search results - page 10 / 98
» Policy-Based Cryptography and Applications
Sort
View
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
13 years 11 months ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert
CARDIS
2006
Springer
88views Hardware» more  CARDIS 2006»
13 years 11 months ago
Implementing Cryptography on TFT Technology for Secure Display Applications
Petros Oikonomakos, Jacques J. A. Fournier, Simon ...
NIPS
2004
13 years 8 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...