Sciweavers

1834 search results - page 171 / 367
» Public Key Cryptography
Sort
View
BDA
2007
13 years 11 months ago
Querying and Aggregating Visible and Hidden Data Without Leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
DEXAW
2002
IEEE
231views Database» more  DEXAW 2002»
14 years 2 months ago
A Cultural Heritage Forum Celebrating Technological Innovation at Station X
We aim to encourage and support public participation in heritage through the development of Cultural Heritage Forums, a kind of cultural web portal that enables active participati...
Trevor D. Collins, Paul Mulholland
AMC
2007
184views more  AMC 2007»
13 years 9 months ago
Elliptic curve scalar multiplication algorithm using complementary recoding
Elliptic curve based cryptosystem is an efficient public key cryptosystem, which is more suitable for limited environments. The very expensive operation in elliptic curve based cr...
P. Balasubramaniam, E. Karthikeyan
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 10 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
14 years 4 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...