Sciweavers

700 search results - page 102 / 140
» words 2005
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 10 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
AIED
2005
Springer
15 years 10 months ago
Motivating Appropriate Challenges in a Reciprocal Tutoring System
Abstract. Formalizing a student model for an educational system requires an engineering effort that is highly domain-specific. This model-specificity limits the ability to scale ...
Ari Bader-Natal, Jordan B. Pollack
ASIACRYPT
2005
Springer
15 years 10 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
CALCO
2005
Springer
105views Mathematics» more  CALCO 2005»
15 years 10 months ago
Bisimilarity Is Not Finitely Based over BPA with Interrupt
This paper shows that bisimulation equivalence does not afford a finite equational axiomatization over the language obtained by enriching Bergstra and Klop’s Basic Process Alge...
Luca Aceto, Wan Fokkink, Anna Ingólfsd&oacu...
CHES
2005
Springer
107views Cryptology» more  CHES 2005»
15 years 10 months ago
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis
We describe a new variant of the well known Baby-Step Giant-Step algorithm in the case of some discrete logarithms with a special structure. More precisely, we focus on discrete lo...
Jean-Sébastien Coron, David Lefranc, Guilla...