Sciweavers

1898 search results - page 14 / 380
» Weak Keys for IDEA
Sort
View
AFRICACRYPT
2008
Springer
14 years 3 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
SP
2009
IEEE
14 years 3 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
JCST
2008
120views more  JCST 2008»
13 years 8 months ago
Generic Transformation from Weakly to Strongly Unforgeable Signatures
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed...
Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao
SIAMNUM
2011
117views more  SIAMNUM 2011»
13 years 3 months ago
Mixed hp-Finite Element Method for Linear Elasticity with Weakly Imposed Symmetry: Stability Analysis
The paper presents a generalization of Arnold-Falk-Winther elements for linear elasticity, to meshes with elements of variable order. The generalization is straightforward but the ...
Weifeng Qiu, Leszek F. Demkowicz
ENTCS
2006
141views more  ENTCS 2006»
13 years 8 months ago
Refining the Undecidability Border of Weak Bisimilarity
Weak bisimilarity is one of the most studied behavioural equivalences. This equivalence is undecidable for pushdown processes (PDA), process algebras (PA), and multiset automata (...
Mojmír Kretínský, Vojtech Reh...