Sciweavers

2432 search results - page 141 / 487
» Cryptographic logical relations
Sort
View
74
Voted
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 24 days ago
A finiteness structure on resource terms
In our paper "Uniformity and the Taylor expansion of ordinary lambda-terms" (with Laurent Regnier), we studied a translation of lambda-terms as infinite linear combinati...
Thomas Ehrhard
82
Voted
COLING
2002
15 years 16 days ago
The Chinese Aspect System and its Semantic Interpretation
: Motivated by a systematic representation of the Chinese aspect forms that explores their intrinsic semantics and temporal logical relations, we are constructing a Chinese aspect ...
Guowen Yang, John A. Bateman
106
Voted
EUROCRYPT
2001
Springer
15 years 5 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
CSFW
2007
IEEE
15 years 7 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
121
Voted
ICITS
2009
14 years 10 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs