Sciweavers

1585 search results - page 192 / 317
» Automatically optimizing secure computation
Sort
View
CONCUR
2007
Springer
15 years 8 months ago
Strategy Logic
We introduce strategy logic, a logic that treats strategies in two-player games as explicit first-order objects. The explicit treatment of strategies allows us to specify properti...
Krishnendu Chatterjee, Thomas A. Henzinger, Nir Pi...
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 8 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
ISW
2005
Springer
15 years 7 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
PQCRYPTO
2010
187views Cryptology» more  PQCRYPTO 2010»
15 years 5 months ago
Information-Set Decoding for Linear Codes over Fq
The best known non-structural attacks against code-based cryptosystems are based on information-set decoding. Stern’s algorithm and its improvements are well optimized and the co...
Christiane Peters
DATESO
2010
150views Database» more  DATESO 2010»
14 years 12 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...