Sciweavers

59 search results - page 2 / 12
» Fast Computation on Encrypted Polynomials and Applications
Sort
View
EUROCRYPT
2012
Springer
11 years 7 months ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis
NDSS
2005
IEEE
13 years 10 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
ISSAC
2004
Springer
135views Mathematics» more  ISSAC 2004»
13 years 10 months ago
The truncated fourier transform and applications
In this paper, we present a truncated version of the classical Fast Fourier Transform. When applied to polynomial multiplication, this algorithm has the nice property of eliminati...
Joris van der Hoeven
NCA
2008
IEEE
13 years 4 months ago
The application of ridge polynomial neural network to multi-step ahead financial time series prediction
Motivated by the slow learning properties of multilayer perceptrons (MLPs) which utilize computationally intensive training algorithms, such as the backpropagation learning algorit...
Rozaida Ghazali, Abir Jaafar Hussain, Panos Liatsi...
PEWASUN
2005
ACM
13 years 10 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari