Algebraic key establishment protocols based on the difficulty of solving equations over algebraic structures are described as a theoretical basis for constructing public–key cryptosystems.
Low rate wireless personal area networks (LR-WPANs) offer device level wireless connectivity. They bring to light a host of new applications as well as enhance existing applications. Due to their low cost, low power consumption and self-organization features, LR-WPANs are ideal for applications such as public security, battle field monitoring, inventory… (More)
The study of the distribution of prime numbers has fascinated mathematicians since antiquity. It is only in modern times, however, that a precise asymptotic law for the number of primes in arbitrarily long intervals has been obtained. For a real number x > 1, let π(x) denote the number of primes less than x. The prime number theorem is the assertion that… (More)
Dedicated to Benjamin Fine on the occasion of his 60th birthday. A method for non-abelian Cramer-Shoup cryptosystem is presented. The role of decision and search is explored, and the platform of solvable / polycyclic group is suggested. In the process we review recent progress in non-abelian cryptography and post some open problems that naturally arise from… (More)
Our purpose is to show the equivalence of the conjugacy problem for certain HNN extensions of the infinite cyclic groups and the reachability problem for the class of self-dual vector addition systems. In addition, we extend an endo-morphism theorem of the author's to a homomorphism theorem and indicate a problem related to the isomorphism problem for a… (More)