Sciweavers

36 search results - page 7 / 8
» Lossy Trapdoor Functions and Their Applications
Sort
View
ISPEC
2005
Springer
13 years 10 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
SIAMCOMP
2010
147views more  SIAMCOMP 2010»
13 years 2 months ago
Uniform Direct Product Theorems: Simplified, Optimized, and Derandomized
The classical direct product theorem for circuits says that if a Boolean function f : {0, 1}n → {0, 1} is somewhat hard to compute on average by small circuits, then the correspo...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...
ASIACRYPT
2000
Springer
13 years 8 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
ICIP
2002
IEEE
13 years 9 months ago
Wavelet coding of volumetric medical datasets
—Several techniques based on the three–dimensional (3-D) discrete cosine transform (DCT) have been proposed for volumetric data coding. These techniques fail to provide lossles...
Adrian Munteanu, Peter Schelkens, Jan Cornelis
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
14 years 5 months ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...