Sciweavers

1628 search results - page 220 / 326
» Compiler Construction Using Scheme
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
FOCS
2007
IEEE
15 years 11 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
TVLSI
2008
110views more  TVLSI 2008»
15 years 4 months ago
Thermal Switching Error Versus Delay Tradeoffs in Clocked QCA Circuits
Abstract--The quantum-dot cellular automata (QCA) model offers a novel nano-domain computing architecture by mapping the intended logic onto the lowest energy configuration of a co...
Sanjukta Bhanja, Sudeep Sarkar
130
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
SIMULATION
2002
118views more  SIMULATION 2002»
15 years 4 months ago
Simulation of Tactical Communications Systems by Inferring Detailed Data from the Joint Theater-Level Computer-Aided Exercises
- In this paper, a new scheme for the simulation of tactical communications systems is introduced where the mobility, call and availability patterns for the communications equipmen...
Erdal Cayirci, Cem Ersoy