Sciweavers

45 search results - page 8 / 9
» Simple Functional Encryption Schemes for Inner Products
Sort
View
AES
2004
Springer
151views Cryptology» more  AES 2004»
13 years 11 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
DSN
2004
IEEE
13 years 9 months ago
Robust Aggregation Protocols for Large-Scale Overlay Networks
Aggregation refers to a set of functions that provide global information about a distributed system. These functions operate on numeric values distributed over the system and can ...
Alberto Montresor, Márk Jelasity, Özal...
ICSM
1997
IEEE
13 years 10 months ago
Software Change Through Design Maintenance
Conventional software engineering tends to focus on a small part of the software life cycle: the design and implementation of a product. The bulk of the lifetime cost is in the ma...
Ira D. Baxter, Christopher Pidgeon
NIPS
1996
13 years 7 months ago
A Model of Recurrent Interactions in Primary Visual Cortex
A general feature of the cerebral cortex is its massive interconnectivity-ithas been estimatedanatomically 15 that cortical neurons receive on the order of 10,000 synapses, the ma...
Emanuel Todorov, Athanassios Siapas, David Somers
ASIACRYPT
2000
Springer
13 years 10 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois