Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 76 - 90 of 312.

Add to Quick Collection   All 312 Results

Sort:
 Add All Items to Quick Collection
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/147985
Description: We describe public key encryption schemes with security provably based on the worst case hardness of the approximate Shortest Vector Problem in some structured lattices, called ideal lattices. Under t ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1228286
Description: 5 page(s)
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/131013
Description: While there has been research on the diffusion of a particular type of innovation, few if any studies have examined the acceptance of a set of innovations (behavioral innovativeness) over time. This s ... More
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/147984
Description: We study the computability and complexity of the exploration problem in a class of highly dynamic graphs: periodically varying (PV) graphs, where the edges exist only at some (unknown) times defined b ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117562
Description: At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/130608
Description: It is well-known that the performance of wireless protocols depends on the quality of the wireless links, which in turn is affected by the network topology. The aim of this paper is to investigate the ... More
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/129659
Description: It is shown that only a fraction of 2-Ω(n) of the graphs on n vertices have an integral spectrum. Although there are several explicit constructions of such graphs, no upper bound for their number has ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146736
Description: It is shown that the discriminant of the discriminant of a multivariate polynomial has the same irreducible factors as the product of seven polynomials each of which is defined as the GCD of the gener ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117566
Description: Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P1, ..., Pn, each with their own private input xi, to compute a function Y = F(x1, ..., xn), such tha ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/130997
Description: We give upper bounds for sums of multiplicative characters modulo an integer q ≧ 2 with the Euler function ϕ ( n ) and with the shifted largest prime divisor P ( n ) + a of integers n ≦ x .
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/150059
Description: 8 page(s)
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/130393
Description: 6 page(s)
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/145345
Description: We study the hash function from a finite field Fq into an elliptic curve over Fq which has recently been introduced by T. Icart. In particular we slightly adjust and prove the asymptotic formula conje ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/118660
Description: Introduced by Kraitchik and Lehmer, an x-pseudosquare is a positive integer n ≡ I (mod 8) that is a quadratic residue for each odd prime p ≤ x, yet is not a square. We use bounds of character sums to ... More
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/92393
Description: It has been shown by J.-P. Serre that the largest possible number of Fq-rational points on curves of small genus over the finite field Fq of q elements depends on the divisibility property p | [2q½], ... More