Sciweavers

661 search results - page 52 / 133
» Argument Reduction by Factoring
Sort
View
73
Voted
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
106
Voted
FLAIRS
2007
15 years 3 months ago
Probabilistic Knowledge Processing and Remaining Uncertainty
Information is indispensable in preparing economic decisions purposefully. In this paper knowledge is represented by a probability distribution. Knowledge acquisition is realized ...
Elmar Reucher, Friedhelm Kulmann
DAGSTUHL
2007
15 years 2 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
123
Voted
TCS
2008
15 years 20 days ago
The role of information in the cop-robber game
We investigate the role of the information available to the players on the outcome of the cops and robbers game. This game takes place on a graph and players move along the edges ...
Volkan Isler, Nikhil Karnad
87
Voted
ENTCS
2002
101views more  ENTCS 2002»
15 years 17 days ago
Hypergeometric Functions in Exact Geometric Computation
Most problems in computational geometry are algebraic. A general approach to address nonrobustness in such problems is Exact Geometric Computation (EGC). There are now general lib...
Zilin Du, Maria Eleftheriou, José E. Moreir...