Sciweavers

814 search results - page 47 / 163
» Analysis of Modular Arithmetic
Sort
View
ISSAC
2009
Springer
169views Mathematics» more  ISSAC 2009»
15 years 4 months ago
Computations modulo regular chains
The computation of triangular decompositions involves two fundamental operations: polynomial GCDs modulo regular chains and regularity test modulo saturated ideals. We propose new...
Xin Li, Marc Moreno Maza, Wei Pan
EUROCRYPT
2010
Springer
15 years 2 months ago
Fully Homomorphic Encryption over the Integers
We describe a very simple “somewhat homomorphic” encryption scheme using only elementary modular arithmetic, and use Gentry’s techniques to convert it into a fully homomorph...
Marten van Dijk, Craig Gentry, Shai Halevi, Vinod ...
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
15 years 2 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
TASE
2008
IEEE
14 years 9 months ago
An Extension to Pointer Logic for Verification
The safety of pointer programs is an important issue in high-assurance software design, and their verification remains a major challenge. Pointer Logic has been proposed to verify...
Zhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang,...
ASIACRYPT
2005
Springer
15 years 3 months ago
Modular Security Proofs for Key Agreement Protocols
The security of key agreement protocols has traditionally been notoriously hard to establish. In this paper we present a modular approach to the construction of proofs of security ...
Caroline Kudla, Kenneth G. Paterson