Sciweavers

CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
15 years 9 months ago
A general architecture for reliable decentralized supervisory control of discrete event systems
In this paper, we study the reliable decentralized supervisory control of discrete event systems (DESs) under the general architecture, in which the decision for controllable event...
Fuchun Liu, Hai Lin
153
Voted
PKC
2010
Springer
162views Cryptology» more  PKC 2010»
15 years 9 months ago
Faster Pairing Computations on Curves with High-Degree Twists
Research on efficient pairing implementation has focussed on reducing the loop length and on using high-degree twists. Existence of twists of degree larger than 2 is a very restric...
Craig Costello, Tanja Lange, Michael Naehrig
169
Voted
PKC
2010
Springer
193views Cryptology» more  PKC 2010»
15 years 9 months ago
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction follows that of Gentry by producing a fully homomorphic s...
Nigel P. Smart, Frederik Vercauteren
PKC
2010
Springer
138views Cryptology» more  PKC 2010»
15 years 9 months ago
Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
We present an elementary method to construct optimized lattices that are used for finding small roots of polynomial equations. Former methods first construct some large lattice i...
Mathias Herrmann, Alexander May
140
Voted
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
15 years 9 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...