Sciweavers

488 search results - page 11 / 98
» Policy-Based Cryptography and Applications
Sort
View
ECCC
2010
95views more  ECCC 2010»
13 years 4 months ago
On optimal heuristic randomized semidecision procedures, with applications to proof complexity and cryptography
The existence of a (p-)optimal propositional proof system is a major open question in (proof) complexity; many people conjecture that such systems do not exist. Kraj
Edward A. Hirsch, Dmitry Itsykson, Ivan Monakhov, ...
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 2 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
11 years 9 months ago
Multi-instance Security and Its Application to Password-Based Cryptography
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
IPPS
2003
IEEE
14 years 19 days ago
Secret Key Cryptography with Cellular Automata
The paper presents new results concerning application of cellular automata (CAs) to the secret key cryptography
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
ISW
1997
Springer
13 years 11 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng