Results 1  10
of
13
The Dark Side of "BlackBox" Cryptography or: Should We Trust Capstone?
 in Advances in Cryptology  Crypto '96
, 1996
"... . The use of cryptographic devices as "black boxes", namely trusting their internal designs, has been suggested and in fact Capstone technology is offered as a next generation hardwareprotected escrow encryption technology. Software cryptographic servers and programs are being offered as well, for ..."
Abstract

Cited by 21 (4 self)
 Add to MetaCart
. The use of cryptographic devices as "black boxes", namely trusting their internal designs, has been suggested and in fact Capstone technology is offered as a next generation hardwareprotected escrow encryption technology. Software cryptographic servers and programs are being offered as well, for use as library functions, as cryptography gets more and more prevalent in computing environments. The question we address in this paper is how the usage of cryptography as a black box exposes users to various threats and attacks that are undetectable in a blackbox environment. We present the SETUP (Secretly Embedded Trapdoor with Universal Protection) mechanism, which can be embedded in a cryptographic blackbox device. It enables an attacker (the manufacturer) to get the user's secret (from some stage of the output process of the device) in an unnoticeable fashion, yet protects against attacks by others and against reverse engineering (thus, maintaining the relative advantage of the actual...
A new class of qFibonacci polynomials
 Electron. J. Combin. 10 (2003), Research Paper
, 2003
"... We introduce a new qanalogue of the Fibonacci polynomials and derive some of its properties. Extra attention is paid to a special case which has some interesting connections with Euler's pentagonal number theorem. 1 ..."
Abstract

Cited by 11 (1 self)
 Add to MetaCart
We introduce a new qanalogue of the Fibonacci polynomials and derive some of its properties. Extra attention is paid to a special case which has some interesting connections with Euler's pentagonal number theorem. 1
Fermionic expressions for the characters of c(p,1) logarithmic conformal field theories
 Nucl. Phys. B
"... We present fermionic quasiparticle sum representations consisting of a single fundamental fermionic form for all characters of the logarithmic conformal field theory models with central charge cp,1, p ≥ 2, and suggest a physical interpretation. We also show that it is possible to correctly extract ..."
Abstract

Cited by 9 (2 self)
 Add to MetaCart
We present fermionic quasiparticle sum representations consisting of a single fundamental fermionic form for all characters of the logarithmic conformal field theory models with central charge cp,1, p ≥ 2, and suggest a physical interpretation. We also show that it is possible to correctly extract dilogarithm identities.
Multiple finite Riemann zeta functions
, 2008
"... Observing a multiple version of the divisor function we introduce a new zeta function which we call a multiple finite Riemann zeta function. We utilize some qseries identity for proving the zeta function has an Euler product and then, describe the location of zeros. We study further multivariable ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Observing a multiple version of the divisor function we introduce a new zeta function which we call a multiple finite Riemann zeta function. We utilize some qseries identity for proving the zeta function has an Euler product and then, describe the location of zeros. We study further multivariable and multiparameter versions of the multiple finite Riemann zeta functions and their infinite counterparts in connection with symmetric polynomials and some arithmetic quantities called powerful numbers.
The Crystallographic Restriction, Permutations, and Goldbach’s Conjecture
"... Goldbach’s conjecture, the crystallographic restriction, and the orders of the elements of the symmetric group. First recall that for an element g of a group G the order Ord(g) of g is defined to be the smallest natural number such that g Ord(g) = id if such a number exists, and Ord(g) =∞otherwise. ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Goldbach’s conjecture, the crystallographic restriction, and the orders of the elements of the symmetric group. First recall that for an element g of a group G the order Ord(g) of g is defined to be the smallest natural number such that g Ord(g) = id if such a number exists, and Ord(g) =∞otherwise. In dimension n, thecrystallographic
unknown title
, 1998
"... The perturbation ϕ2,1 of the M(p, p + 1) models of conformal field theory and related polynomialcharacter identities ..."
Abstract
 Add to MetaCart
The perturbation ϕ2,1 of the M(p, p + 1) models of conformal field theory and related polynomialcharacter identities
unknown title
, 1998
"... The perturbation ϕ2,1 of the M(p, p + 1) models of conformal field theory and related polynomialcharacter identities ..."
Abstract
 Add to MetaCart
The perturbation ϕ2,1 of the M(p, p + 1) models of conformal field theory and related polynomialcharacter identities
Acknowledgements
, 2004
"... 2002, and Spring of 2003. She pursued her research in the area of cohomology of ..."
Abstract
 Add to MetaCart
2002, and Spring of 2003. She pursued her research in the area of cohomology of
mock theta function identities are derived.
, 1997
"... Abstract. We propose and prove a trinomial version of the celebrated Bailey’s lemma. As an application we obtain new fermionic representations for characters of some unitary as well as nonunitary models of N = 2 superconformal field theory (SCFT). We also establish interesting relations between N = ..."
Abstract
 Add to MetaCart
Abstract. We propose and prove a trinomial version of the celebrated Bailey’s lemma. As an application we obtain new fermionic representations for characters of some unitary as well as nonunitary models of N = 2 superconformal field theory (SCFT). We also establish interesting relations between N = 1 and N = 2 models of SCFT with central charges 3 2