Sciweavers

14 search results - page 1 / 3
» ima 2009
Sort
View
IMA
2009
Springer
149views Cryptology» more  IMA 2009»
14 years 2 months ago
Practical Zero-Knowledge Proofs for Circuit Evaluation
Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi
IMA
2009
Springer
132views Cryptology» more  IMA 2009»
14 years 2 months ago
Subspace Codes
Abstract. This paper is a survey of bounds and constructions for subspace codes designed for the injection metric, a distance measure that arises in the context of correcting adver...
Azadeh Khaleghi, Danilo Silva, Frank R. Kschischan...
IMA
2009
Springer
145views Cryptology» more  IMA 2009»
14 years 2 months ago
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions
Let f : F n 2 → F n 2 be an almost perfect nonlinear function (APN). The set Df := {(a, b) : f(x + a) − f(x) = b has two solutions} can be used to distinguish APN functions up ...
Yves Edel, Alexander Pott
IMA
2009
Springer
131views Cryptology» more  IMA 2009»
14 years 2 months ago
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Gaudry and Schost gave a low-memory algorithm for solving the 2-dimensional discrete logarithm problem. We present an improvement to their algorithm and extend this improvement to ...
Steven D. Galbraith, Raminder S. Ruprai