Sciweavers

ASIACRYPT
2015
Springer
8 years 5 days ago
Solving Linear Equations Modulo Unknown Divisors: Revisited
Abstract. We revisit the problem of finding small solutions to a collection of linear equations modulo an unknown divisor p for a known composite integer N. In CaLC 2001, Howgrave...
Yao Lu, Rui Zhang 0002, Liqiang Peng, Dongdai Lin
AES
2015
Springer
31views Cryptology» more  AES 2015»
8 years 5 days ago
Approximate inverse preconditioners with adaptive dropping
It is well-known that analysis of incomplete Cholesky and LU decompositions with a general dropping is very difficult and of limited applicability, see, for example, the results o...
Jirí Kopal, Miroslav Rozlozník, Miro...
AES
2015
Springer
16views Cryptology» more  AES 2015»
8 years 7 days ago
Hypergraph products for structural mechanics
In this paper Cartesian, direct and strong Cartesian product of hypergraphs are investigated. A new concept named the adjacency function is defined on hypergraphs. This definition...
A. Kaveh, B. Alinejad
AES
2015
Springer
24views Cryptology» more  AES 2015»
8 years 7 days ago
A bilevel integer programming method for blended composite structures
This paper proposes a new approach for the design of a composite structure. This approach is formulated as an optimization problem where the weight of the structure is minimized s...
S. Zein, M. Bruyneel
ACNS
2015
Springer
22views Cryptology» more  ACNS 2015»
8 years 8 days ago
Private Database Access with HE-over-ORAM Architecture
Enabling private database queries is an important and challenging research problem with many real-world applications. The goal is for the client to obtain the results of its queri...
Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mar...
ACNS
2015
Springer
23views Cryptology» more  ACNS 2015»
8 years 8 days ago
Exploiting Eye Tracking for Smartphone Authentication
Traditional user authentication methods using passcode or finger movement on smartphones are vulnerable to shoulder surfing attack, smudge attack, and keylogger attack. These att...
Dachuan Liu, Bo Dong, Xing Gao, Haining Wang
ACNS
2015
Springer
29views Cryptology» more  ACNS 2015»
8 years 8 days ago
A Fully Decentralized Data Usage Control Enforcement Infrastructure
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
Florian Kelbert, Alexander Pretschner
ACNS
2015
Springer
21views Cryptology» more  ACNS 2015»
8 years 8 days ago
Generic Construction of UC-Secure Oblivious Transfer
We show how to construct a completely generic UC-secure oblivious transfer scheme from a collision-resistant chameleon hash scheme (CH) and a CCA encryption scheme accepting a smoo...
Olivier Blazy, Céline Chevalier
ACNS
2015
Springer
18views Cryptology» more  ACNS 2015»
8 years 8 days ago
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such dev...
Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe