Sciweavers

IJNSEC
2010
104views more  IJNSEC 2010»
13 years 6 months ago
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and S
Zhixiong Chen, Li Xu, Chenhuang Wu
CRYPTO
2001
Springer
145views Cryptology» more  CRYPTO 2001»
14 years 4 months ago
Pseudorandomness from Braid Groups
Recently the braid groups were introduced as a new source for cryptography. The group operations are performed efficiently and the features are quite different from those of other...
Eonkyung Lee, Sangjin Lee, Sang Geun Hahn
DATE
2006
IEEE
102views Hardware» more  DATE 2006»
14 years 5 months ago
Pseudorandom functional BIST for linear and nonlinear MEMS
Pseudorandom test techniques are widely used for measuring the impulse response (IR) for linear devices and Volterra kernels for nonlinear devices, especially in the acoustics dom...
Achraf Dhayni, Salvador Mir, Libor Rufer, Ahc&egra...