Sciweavers

809 search results - page 115 / 162
» 04421 Abstracts Collection - Algebraic Methods in Computatio...
Sort
View
PKC
2007
Springer
109views Cryptology» more  PKC 2007»
15 years 6 months ago
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Abstract. In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosyst...
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wa...
FMCO
2009
Springer
134views Formal Methods» more  FMCO 2009»
14 years 9 months ago
Verification of Context-Dependent Channel-Based Service Models
Abstract. The paradigms of service-oriented computing and modeldriven development are becoming of increasing importance in the field of software engineering. According to these par...
Natallia Kokash, Christian Krause, Erik P. de Vink
ISQED
2005
IEEE
76views Hardware» more  ISQED 2005»
15 years 5 months ago
Technology Mapping for Reliability Enhancement in Logic Synthesis
Abstract— Reliability enhancements are traditionally implemented through redundancies at the system level or through the use of harden-cell-designs at the circuit level. Reliabil...
Zhaojun Wo, Israel Koren
ROBOCUP
2005
Springer
109views Robotics» more  ROBOCUP 2005»
15 years 5 months ago
Using the Max-Plus Algorithm for Multiagent Decision Making in Coordination Graphs
Abstract. Coordination graphs offer a tractable framework for cooperative multiagent decision making by decomposing the global payoff function into a sum of local terms. Each age...
Jelle R. Kok, Nikos A. Vlassis
ICALP
2001
Springer
15 years 4 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung