Learn More
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed , they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such(More)
A (k; n)-threshold visual cryptography scheme ((k; n)-threshold VCS, for short) is a method to encode a secret image SI into n shadow images called shares such that any k or more shares enable the \visual" recovery of the secret image, but by inspecting less that k share one cannot gain any information on the secret image. The \visual" recovery consists of(More)
A Key Distribution Center enables secure communications among groups of users in a network by providing common keys that can be used with a symmetric encryption algorithm to encrypt and decrypt messages the users wish to send to each other. A Distributed Key Distribution Center is a set of servers of a network that jointly realize a Key Distribution Center.(More)
The purpose of this study was to evaluate the clinical, functional, and radiographic outcomes of the conventional and modified Boyd-Anderson procedures for repair of distal biceps tendon ruptures. Thirteen of 18 men who underwent surgical repair for unilateral distal biceps tendon ruptures at one university center participated in the study. In general,(More)
A recent research trend, motivated by the massive deployment of RFID technology, looks at cryptographic protocols for securing communication between entities in which some of the parties have very limited computing capabilities. In this paper, we focus our attention on SASI, a new RFID authentication protocol, designed for providing Strong Authentication(More)