152
click to vote
CAI
9 years 8 months ago
2015 Springer
The problem of proof simplification draws a lot of attention to itself across various contexts. In this paper, we present one approach for simplifying proofs constructed in the fr...
96
Voted
CAI
9 years 8 months ago
2015 Springer
An important attack on multi-power RSA (N = pr q) was introduced by Sarkar in 2014, by extending the small private exponent attack of Boneh and Durfee on classical RSA. In particul...
95
Voted
CAI
9 years 8 months ago
2015 Springer
Abstract. Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, b...
92
Voted
CAI
9 years 8 months ago
2015 Springer
In this paper, we extend the method of Scott and Barreto and present an explicit and simple algorithm to generate families of generalized MNT elliptic curves. Our algorithm allows ...
CAI
9 years 8 months ago
2015 Springer
Many tasks in text and speech processing and computational biology require estimating functions mapping strings to real numbers. A broad class of such functions can be defined by...
|