Sciweavers

1898 search results - page 56 / 380
» Weak Keys for IDEA
Sort
View
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 8 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
ENTCS
2007
86views more  ENTCS 2007»
13 years 8 months ago
On the Non-sequential Nature of Domain Models of Real-number Computation
Escard´o, Hofmann and Streicher showed that real-number computations in the interval-domain environment are inherently parallel, in the sense that they imply the presence of weak...
Thomas Anberrée
ECCC
2000
75views more  ECCC 2000»
13 years 8 months ago
Deterministic Turing Machines in the Range between Real-Time and Linear-Time
Deterministic k-tape and multitape Turing machines with one-way, two-way and without a separated input tape are considered. We investigate the classes of languages acceptable by s...
Andreas Klein, Martin Kutrib
INFORMATICALT
2000
123views more  INFORMATICALT 2000»
13 years 8 months ago
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures
Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weak...
Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang
IPL
2000
105views more  IPL 2000»
13 years 8 months ago
Coverings that preserve sense of direction
Sense of direction is a property of labelled networks (i.e., arc-coloured graphs) that allows one to assign coherently local identifiers to other processors on the basis of the ro...
Paolo Boldi, Sebastiano Vigna