Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 91 - 105 of 312.

Add to Quick Collection   All 312 Results

Sort:
 Add All Items to Quick Collection
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/132977
Description: We show, under the Generalized Riemann Hypothesis, that a certain set of primes which is of importance for the theory of pseudorandom sequences is of positive relative density. We also use an uncondit ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/88417
Description: 7 page(s)
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/129967
Description: Given an elliptic curve E over ℚ we estimate the number of primes p≤T for which the number of points on reduction of E modulo p has a large prime factor ℓ and also a small embedding degree with respec ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/116008
Description: Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/85245
Description: 3 page(s)
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/130337
Description: We show that for a fixed integer base g ≥ 2 the palindromes to base g which are k-powers form a very thin set in the set of all base g palindromes. On the other hand, we also give a lower bound which ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/92721
Description: We give a survey of several recently suggested constructions of generating sequences of pseudorandom points on elliptic curves. Such constructions are of interest for both classical and elliptic curve ... More
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148619
Description: Security and probability are both artefacts that we hope to bring increasingly within the reach of refinement-based Formal Methods; although we have worked on them separately, in the past, the goal ha ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/130172
Description: Given a prime p, we consider the dynamical system generated by repeated exponentiations modulo p, that is, by the map u ® fg(u), where f g (u) ≡ g u (mod p) and 0 ≤ f g (u) ≤ p − 1. This map is in par ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/133006
Description: We show how to accelerate the subset sum pseudorandom number generator with arbitrary weights. Some special choices of weights speed up the naive usage of this generator without losing the property of ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148612
Description: A truly secure protocol is one which never violates its security requirements, no matter how bizarre the circumstances, provided those circumstances are within its terms of reference. Such cast-iron g ... More
Reviewed: Reviewed
Authors: Garner, Richard
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/119149
Description: We describe a non-extensional variant of Martin-Löf type theory, which we call two-dimensional type theory, and equip it with a sound and complete semantics valued in 2-categories.
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/322840
Description: 17 page(s)
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/116781
Description: We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing effici ... More
Reviewed: Reviewed
Date: 2008
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117339
Description: The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes ... More
Reviewed: Reviewed