Sciweavers

488 search results - page 10 / 98
» Policy-Based Cryptography and Applications
Sort
View
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
15 years 7 months ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert
CARDIS
2006
Springer
88views Hardware» more  CARDIS 2006»
15 years 7 months ago
Implementing Cryptography on TFT Technology for Secure Display Applications
Petros Oikonomakos, Jacques J. A. Fournier, Simon ...
213
Voted
NIPS
2004
15 years 4 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
97
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
Tibor Jager, Andy Rupp