Sciweavers

661 search results - page 52 / 133
» Argument Reduction by Factoring
Sort
View
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
FLAIRS
2007
15 years 2 days ago
Probabilistic Knowledge Processing and Remaining Uncertainty
Information is indispensable in preparing economic decisions purposefully. In this paper knowledge is represented by a probability distribution. Knowledge acquisition is realized ...
Elmar Reucher, Friedhelm Kulmann
DAGSTUHL
2007
14 years 11 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
TCS
2008
14 years 9 months ago
The role of information in the cop-robber game
We investigate the role of the information available to the players on the outcome of the cops and robbers game. This game takes place on a graph and players move along the edges ...
Volkan Isler, Nikhil Karnad
ENTCS
2002
101views more  ENTCS 2002»
14 years 9 months ago
Hypergeometric Functions in Exact Geometric Computation
Most problems in computational geometry are algebraic. A general approach to address nonrobustness in such problems is Exact Geometric Computation (EGC). There are now general lib...
Zilin Du, Maria Eleftheriou, José E. Moreir...