- Full text PDF available (13)
- This year (0)
- Last 5 years (0)
- Last 10 years (8)
Algebraic key establishment protocols based on the difficulty of solving equations over algebraic structures are described as a theoretical basis for constructing public–key cryptosystems.
Key agreement protocols are presented whose security is based on the difficulty of inverting one-way functions derived from hard problems for braid groups. Efficient/low cost algorithms for key transfer/extraction are presented. Attacks/security parameters are discussed.
Low rate wireless personal area networks (LR-WPANs) offer device level wireless connectivity. They bring to light a host of new applications as well as enhance existing applications. Due to their low cost, low power consumption and self-organization features, LR-WPANs are ideal for applications such as public security, battle field monitoring, inventory… (More)
The use of approach and avoidance coping styles and task-focused and emotion-focused coping strategies in competitive sport was explored. Four hundred twenty-one adolescent males from New South Wales, Australia, who were currently competing in team sports indicated their usual responses to each of 8 acute stressors commonly experienced in sport, using a… (More)
The study of the distribution of prime numbers has fascinated mathematicians since antiquity. It is only in modern times, however, that a precise asymptotic law for the number of primes in arbitrarily long intervals has been obtained. For a real number x > 1, let π(x) denote the number of primes less than x. The prime number theorem is the assertion that… (More)
Dedicated to Benjamin Fine on the occasion of his 60th birthday. A method for non-abelian Cramer-Shoup cryptosystem is presented. The role of decision and search is explored, and the platform of solvable / polycyclic group is suggested. In the process we review recent progress in non-abelian cryptography and post some open problems that naturally arise from… (More)