181
Voted
CAI
9 years 11 months ago
2015 Springer
The problem of proof simplification draws a lot of attention to itself across various contexts. In this paper, we present one approach for simplifying proofs constructed in the fr...
122
Voted
CAI
9 years 11 months ago
2015 Springer
An important attack on multi-power RSA (N = pr q) was introduced by Sarkar in 2014, by extending the small private exponent attack of Boneh and Durfee on classical RSA. In particul...
119
Voted
CAI
9 years 11 months ago
2015 Springer
Abstract. Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, b...
115
Voted
CAI
9 years 11 months ago
2015 Springer
In this paper, we extend the method of Scott and Barreto and present an explicit and simple algorithm to generate families of generalized MNT elliptic curves. Our algorithm allows ...
110
Voted
CAI
9 years 11 months ago
2015 Springer
Many tasks in text and speech processing and computational biology require estimating functions mapping strings to real numbers. A broad class of such functions can be defined by...
|