Sciweavers

25 search results - page 4 / 5
» ccs 1998
Sort
View
CCS
1998
ACM
13 years 9 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern
CGF
2010
115views more  CGF 2010»
13 years 5 months ago
Closed-form Blending of Local Symmetries
We present a closed-form solution for the symmetrization problem, solving for the optimal deformation that reconciles a set of local bilateral symmetries. Given as input a set of ...
Deboshmita Ghosh, Nina Amenta, Michael M. Kazhdan
ICFP
1998
ACM
13 years 9 months ago
Fold and Unfold for Program Semantics
In this paper we explain how recursion operators can be used to structure and reason about program semantics within a functional language. In particular, we show how the recursion...
Graham Hutton
CCS
2008
ACM
13 years 7 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
CGF
2008
120views more  CGF 2008»
13 years 5 months ago
Generating Color Palettes using Intuitive Parameters
Color is widely used in data visualization to show data values. The proper selection of colors is critical to convey information correctly. In this paper, we present a technique f...
Martijn Wijffelaars, Roel Vliegen, Jarke J. van Wi...