Sciweavers

24188 search results - page 234 / 4838
» Computing on Encrypted Data
Sort
View
170
Voted
ALIFE
1999
15 years 3 months ago
An Approach to Biological Computation: Unicellular Core-Memory Creatures Evolved Using Genetic Algorithms
A novel machine language genetic programming system that uses one-dimensional core memories is proposed and simulated. The core is compared to a biochemical reaction space, and in ...
Hikeaki Suzuki
111
Voted
PERCOM
2009
ACM
15 years 10 months ago
Quality- and Energy-Aware Data Compression by Aggregation in WSN Data Streams
Cinzia Cappiello, Fabio A. Schreiber
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
115
Voted
CTRSA
2010
Springer
216views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Speed Records for NTRU
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself excellently for parallelization and performs...
Jens Hermans, Frederik Vercauteren, Bart Preneel
IEEEARES
2009
IEEE
15 years 10 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi