196
click to vote
CAI
10 years 19 days ago
2015 Springer
The problem of proof simplification draws a lot of attention to itself across various contexts. In this paper, we present one approach for simplifying proofs constructed in the fr...
137
click to vote
CAI
10 years 19 days ago
2015 Springer
An important attack on multi-power RSA (N = pr q) was introduced by Sarkar in 2014, by extending the small private exponent attack of Boneh and Durfee on classical RSA. In particul...
135
click to vote
CAI
10 years 19 days ago
2015 Springer
Abstract. Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, b...
131
click to vote
CAI
10 years 19 days ago
2015 Springer
In this paper, we extend the method of Scott and Barreto and present an explicit and simple algorithm to generate families of generalized MNT elliptic curves. Our algorithm allows ...
125
click to vote
CAI
10 years 19 days ago
2015 Springer
Many tasks in text and speech processing and computational biology require estimating functions mapping strings to real numbers. A broad class of such functions can be defined by...
|