Sciweavers

69 search results - page 2 / 14
» Homomorphic Evaluation Requires Depth
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 8 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
TSE
2010
197views more  TSE 2010»
13 years 1 months ago
A Genetic Algorithm-Based Stress Test Requirements Generator Tool and Its Empirical Evaluation
Genetic algorithms (GAs) have been applied previously to UML-driven, stress test requirements generation with the aim of increasing chances of discovering faults relating to networ...
Vahid Garousi
ANTS
2010
Springer
250views Algorithms» more  ANTS 2010»
13 years 10 months ago
A Subexponential Algorithm for Evaluating Large Degree Isogenies
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between ellip...
David Jao, Vladimir Soukharev
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
13 years 10 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
GRAPHICSINTERFACE
2011
12 years 10 months ago
Pop-up depth views for improving 3D target acquisition
We present the design and experimental evaluation of pop-up depth views, a novel interaction technique for aiding in the placement or positioning of a 3D cursor or object. Previou...
Guangyu Wang, Michael J. McGuffin, François...