Sciweavers

36 search results - page 4 / 8
» Lossy Trapdoor Functions and Their Applications
Sort
View
ASIACRYPT
2009
Springer
13 years 8 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
13 years 11 months ago
LQG control over lossy TCP-like networks with probabilistic packet acknowledgements
Abstract— This paper is concerned with control applications over lossy data networks. Sensor data is transmitted to an estimation-control unit over a network, and control command...
Emanuele Garone, Bruno Sinopoli, Alessandro Casavo...
ICIP
2007
IEEE
14 years 7 months ago
Resource Allocation for Downlink Multiuser Video Transmission Over Wireless Lossy Networks
The emergence of 3G and 4G wireless networks brings with it the possibility of streaming high quality video content on-demand to mobile users. Wireless video applications require ...
Ehsan Maani, Peshala V. Pahalawatta, Randall Berry...
EUROCRYPT
2001
Springer
13 years 9 months ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 1 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...