Sciweavers

2432 search results - page 66 / 487
» Cryptographic logical relations
Sort
View
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
14 years 8 months ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
ILP
2007
Springer
15 years 4 months ago
Building Relational World Models for Reinforcement Learning
Abstract. Many reinforcement learning domains are highly relational. While traditional temporal-difference methods can be applied to these domains, they are limited in their capaci...
Trevor Walker, Lisa Torrey, Jude W. Shavlik, Richa...
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 4 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
TCS
2008
14 years 10 months ago
Sound and complete computational interpretation of symbolic hashes in the standard model
This paper provides one more step towards bridging the gap between the formal and computational approaches to the verification of cryptographic protocols. We extend the well-known ...
Flavio D. Garcia, Peter van Rossum
EUSFLAT
2009
343views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Towards an Interpretation of the Connectivity Analysis in the Frame of Fuzzy Equivalence Relations for Medical Diagnoses
Connectivity analysis methodology is suitable to find representative symptoms of a disease. This methodology describes connections between symptoms in particular way and then choos...
Tatiana Kiseliova