Sciweavers

6574 search results - page 94 / 1315
» Current Signatures: Application
Sort
View
84
Voted
EUROCRYPT
2010
Springer
15 years 5 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...
104
Voted
NORDSEC
2009
Springer
15 years 5 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
PKC
2001
Springer
95views Cryptology» more  PKC 2001»
15 years 5 months ago
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. We show the relationship a...
Tatsuaki Okamoto, David Pointcheval
112
Voted
DATE
2009
IEEE
118views Hardware» more  DATE 2009»
15 years 4 months ago
Variation resilient adaptive controller for subthreshold circuits
Subthreshold logic is showing good promise as a viable ultra-low-power circuit design technique for powerlimited applications. For this design technique to gain widespread adoption...
Biswajit Mishra, Bashir M. Al-Hashimi, Mark Zwolin...
74
Voted
NIPS
2000
15 years 2 months ago
Support Vector Novelty Detection Applied to Jet Engine Vibration Spectra
A system has been developed to extract diagnostic information from jet engine carcass vibration data. Support Vector Machines applied to novelty detection provide a measure of how...
Paul Hayton, Bernhard Schölkopf, Lionel Taras...