Sciweavers

859 search results - page 60 / 172
» The Changing Face of Cryptography
Sort
View
AMC
2005
126views more  AMC 2005»
13 years 7 months ago
Security of a multisignature scheme for specified group of verifiers
A multisignature scheme for specified group of verifiers needs a group of signers' cooperation to sign a message to a specified group of verifiers that must cooperate to check...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
CORR
2011
Springer
180views Education» more  CORR 2011»
13 years 2 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak
SECURWARE
2008
IEEE
14 years 2 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
AAAI
2004
13 years 9 months ago
Conservative Belief Revision
A standard intuition underlying traditional accounts of belief change is the principle of minimal change. In this paper we introduce a novel account of belief change in which the ...
James P. Delgrande, Abhaya C. Nayak, Maurice Pagnu...