Sciweavers

2967 search results - page 457 / 594
» Cryptology
Sort
View
CCS
1993
ACM
15 years 9 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
15 years 5 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
JC
2007
96views more  JC 2007»
15 years 5 months ago
Error linear complexity measures for multisequences
Complexity measures for sequences over finite fields, such as the linear complexity and the k-error linear complexity, play an important role in cryptology. Recent developments ...
Wilfried Meidl, Harald Niederreiter, Ayineedi Venk...
JOC
1998
162views more  JOC 1998»
15 years 5 months ago
A Software-Optimized Encryption Algorithm
We describe a software-e cient encryption algorithm named SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudo...
Phillip Rogaway, Don Coppersmith
INFFUS
2010
104views more  INFFUS 2010»
15 years 2 months ago
A selection approach for scalable fuzzy integral combination
We consider the problem of collective decision-making from an arbitrary set of classifiers under Sugeno fuzzy integral (S-FI). We assume that classifiers are given, i.e., they can...
Pilar Bulacio, Serge Guillaume, Elizabeth Tapia, L...