Sciweavers

281 search results - page 28 / 57
» amcs 2007
Sort
View
AMC
2006
91views more  AMC 2006»
13 years 7 months ago
Fast elliptic scalar multiplication using new double-base chain and point halving
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scalar multiplication. Based on the double-base chain representation of scalar using...
Kwok-Wo Wong, Edward C. W. Lee, L. M. Cheng, Xiaof...
AMC
2005
106views more  AMC 2005»
13 years 7 months ago
Axisymmetric finite element solution of non-isothermal parallel-plate flow
Steady non-isothermal parallel-plate flow of a Newtonian fluid with a temperature dependent viscosity is considered. The viscosity is modelled by a Nahme type law. We apply axisym...
Shangyou Zhang, David O. Olagunju
AMC
2005
105views more  AMC 2005»
13 years 7 months ago
Symbolic computing of nonlinear observable and observer forms
Observer design for highly nonlinear dynamics is an important issue, particularly when the locally observable dynamics are not linearly observable. In such circumstances the abili...
Harry G. Kwatny, Bor-Chin Chang
AMC
2005
124views more  AMC 2005»
13 years 7 months ago
An efficient undeniable group-oriented signature scheme
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...
Tzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen
AMC
2005
124views more  AMC 2005»
13 years 7 months ago
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. const...
Narn-Yih Lee, Ming-Feng Lee