Zobrazeno 1 - 10
of 17
pro vyhledávání: '"LeGrow, Jason T."'
Binary codes of length $n$ may be viewed as subsets of vertices of the Boolean hypercube $\{0,1\}^n$. The ability of a linear error-correcting code to recover erasures is connected to influences of particular monotone Boolean functions. These functio
Externí odkaz:
http://arxiv.org/abs/2308.01781
Publikováno v:
Designs, Codes & Cryptography; Nov2024, Vol. 92 Issue 11, p3587-3643, 57p
Publikováno v:
Journal of Mathematical Cryptology, Vol 16, Iss 1, Pp 98-102 (2022)
Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a
Externí odkaz:
https://doaj.org/article/b39b6bc8532645ba8e69a18f6bce9f4a
Publikováno v:
Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 18-30 (2020)
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure. We propose the firs
Externí odkaz:
https://doaj.org/article/4d6f16639c144a83bfae2fa0104e4c18
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Mathematical Cryptology; 2021, Vol. 15 Issue 1, p18-30, 13p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Valvo, Daniel William
In this thesis we develop exact repair schemes capable of repairing or circumventing unavailable servers of a distributed network in the context of distributed storage and secure distributed matrix multiplication. We develop the (Λ, Γ, W, ⊙)-exac
Externí odkaz:
http://hdl.handle.net/10919/115028
Autor:
Helena Handschuh, Anna Lysyanskaya
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The
This book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11–14, 2023. The 21 full papers presented together with 6 short papers wer