Sciweavers

340 search results - page 30 / 68
» Cryptography: An Art and Science
Sort
View
DCC
2008
IEEE
15 years 11 months ago
Explicit constructions for perfect hash families
Let k, v, t be integers such that k v t 2. A perfect hash family PHF(N; k, v, t) can be defined as an N ? k array with entries from a set of v symbols such that every N ?t suba...
Sosina Martirosyan, Tran van Trung
ICDCS
2009
IEEE
15 years 9 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
15 years 3 months ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
JOC
2002
76views more  JOC 2002»
14 years 11 months ago
A Note on Negligible Functions
In theoretical cryptography, one formalizes the notion of an adversary's success probability being "too small to matter" by asking that it be a negligible function ...
Mihir Bellare
SIGCSE
2010
ACM
231views Education» more  SIGCSE 2010»
15 years 5 months ago
Implementing studio-based learning in CS2
This paper presents an experience in designing, implementing, and evaluating a studio-based learning model for CS2. Adapted from architecture and art education, as well as from co...
T. Dean Hendrix, Lakshman Myneni, N. Hari Narayana...