- Full text PDF available (13)
Algebraic key establishment protocols based on the difficulty of solving equations over algebraic structures are described as a theoretical basis for constructing public–key cryptosystems.
Low rate wireless personal area networks (LR-WPANs) offer device level wireless connectivity. They bring to light a host of new applications as well as enhance existing applications. Due to their low cost, low power consumption and self-organization features, LR-WPANs are ideal for applications such as public security, battle field monitoring, inventory… (More)
The study of the distribution of prime numbers has fascinated mathematicians since antiquity. It is only in modern times, however, that a precise asymptotic law for the number of primes in arbitrarily long intervals has been obtained. For a real number x > 1, let π(x) denote the number of primes less than x. The prime number theorem is the assertion that… (More)
Dedicated to Benjamin Fine on the occasion of his 60th birthday. A method for non-abelian Cramer-Shoup cryptosystem is presented. The role of decision and search is explored, and the platform of solvable / polycyclic group is suggested. In the process we review recent progress in non-abelian cryptography and post some open problems that naturally arise from… (More)
RFID technology can successfully be used to reduce medical errors. This technology can aid in the accurate matching of patients with their medications and treatments. The enthusiasm for using RFID technology in medical settings has been tempered by privacy concerns. We discuss new encryption methods that address these concerns.