Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2
Pages
|
Viewing 1-10 of 11 total results
On the use of continued fractions for electronic cash
Amadou Moctar Kane International Journal of Computer Science and Security, Volume (4) : Issue (1) 136 On the use of continued fractions for electronic cash Amadou Moctar Kane amadou-moctar.kane.1@ulaval.ca Département de Mathématiques et de Statistiques Université Laval Québec G1V 0A6 Canada. Abstract...
(PDF) On the use of Continued Fractions for Stream Ciphers.
PDF | On Jan 1, 2009, Amadou Moctar Kane and others published On the use of Continued Fractions for Stream Ciphers. | Find, read and cite all the research you need on ResearchGate
Département de Mathématiques et de Statistiques - CiteSeerX
CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): This paper presents an electronic cash scheme using the theory of continued fractions. Continued fractions have already some utilities in cryptography such as in the cryptanalysis of RSA [17] or in the design of some stream ciphers [9]. In order to achieve our prepaid e-cash scheme, we will use the continued fraction ......
Amadou Moctar Kane | Semantic Scholar
Semantic Scholar profile for Amadou Moctar Kane, with 3 highly influential citations and 13 scientific research papers.
 Volume 4, Issue 1, March 2010.
On the use of continued fractions for electronic cash. Amadou Moctar Kane International Journal of Computer Science and Security (IJCSS), Volume (4), Issue (1) Anagha Kulkarni and Radhika Bhagwat
An eco-friendly Ecash with recycled banknotes | DeepAI
06/14/18 - By comparing cryptocurrencies with other existing payment methods, including banknotes and bank cards, it is clear that the use of...
Oalib search
Alioune Badara Sarr, Moctar Camara, Ibrahima Diba International Journal of Geosciences (IJG), 2015, DOI: 10.4236/ijg.2015.69081. Abstract: The objective of this work is to analyze the spatial distribution of biases of nine (9) regional climate models (RCMs) and their ensemble average used under the framework of COordinated Regional climate ...
Breaking and Fixing the Needham-Schroeder Public-Key ...
In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is secure, at least for a small system. Finally we prove a result which tells us that if this small ...
Cryptology ePrint Archive: Listing for 2013
On the use of continued fractions for stream ciphers Amadou Moctar Kane 2013/318 ( PDF) Fully-Anonymous Functional Proxy-Re-Encryption Yutaka Kawai and Katsuyuki Takashima 2013/317 ( PDF) Anon-Pass: Practical Anonymous Subscriptions Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel...
https://eprint.iacr.org/2013/
Average Rating (0 votes)
Loot.co.za: Sitemap
9789041126016 9041126015 Export Control Law and Regulations Handbook - A Practical Guide to Military and Dual-use Goods, Trade Restrictions and Compliance, Yann Aubin, Arnaud Idiart 9781434351647 1434351645 My Mommy Wears Combat Boots, Sharon G. McBride 9780934676434 0934676437 Mahatma Gandhi - Last Phase 1946-8, M Pyarelal
1 2
Pages
|