Sciweavers

3145 search results - page 5 / 629
» Key Improvements to XTR
Sort
View
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
IJNSEC
2011
89views more  IJNSEC 2011»
14 years 4 months ago
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s...
Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin
COLING
2010
14 years 4 months ago
Going Beyond Traditional QA Systems: Challenges and Keys in Opinion Question Answering
The treatment of factual data has been widely studied in different areas of Natural Language Processing (NLP). However, processing subjective information still poses important cha...
Alexandra Balahur, Ester Boldrini, Andrés M...
IACR
2011
124views more  IACR 2011»
13 years 9 months ago
Using the Cloud to Determine Key Strengths
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the mos...
Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Ni...
ACL
2009
14 years 7 months ago
Reducing SMT Rule Table with Monolingual Key Phrase
This paper presents an effective approach to discard most entries of the rule table for statistical machine translation. The rule table is filtered by monolingual key phrases, whi...
Zhongjun He, Yao Meng, Yajuan Lü, Hao Yu, Qun...