Sciweavers

488 search results - page 51 / 98
» Policy-Based Cryptography and Applications
Sort
View
DCC
2008
IEEE
16 years 3 months ago
Explicit constructions for perfect hash families
Let k, v, t be integers such that k v t 2. A perfect hash family PHF(N; k, v, t) can be defined as an N ? k array with entries from a set of v symbols such that every N ?t suba...
Sosina Martirosyan, Tran van Trung
IMA
2009
Springer
124views Cryptology» more  IMA 2009»
15 years 10 months ago
Comparing with RSA
A multi-set (ms) is a set where an element can occur more than once. ms hash functions (mshfs) map mss of arbitrary cardinality to fixed-length strings. This paper introduces a ne...
Julien Cathalo, David Naccache, Jean-Jacques Quisq...
122
Voted
POLICY
2009
Springer
15 years 10 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
131
Voted
SACRYPT
2009
Springer
147views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
A New Approach for FCSRs
The Feedback with Carry Shift Registers (FCSRs) have been proposed as an alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. FCSRs have good st...
François Arnault, Thierry P. Berger, C&eacu...
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
15 years 10 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...