Sciweavers

9186 search results - page 1397 / 1838
» A Module System for Scheme
Sort
View
ASIACRYPT
2003
Springer
15 years 9 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
15 years 9 months ago
Low overhead concurrency control for partitioned main memory databases
Database partitioning is a technique for improving the performance of distributed OLTP databases, since “single partition” transactions that access data on one partition do no...
Evan P. C. Jones, Daniel J. Abadi, Samuel Madden
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
15 years 8 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
126
Voted
ASIACRYPT
2000
Springer
15 years 8 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
EUROCRYPT
1999
Springer
15 years 8 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
« Prev « First page 1397 / 1838 Last » Next »