Sciweavers

876 search results - page 87 / 176
» Limits on the Usefulness of Random Oracles
Sort
View

Book
814views
16 years 10 months ago
Numerical Computing with MATLAB
"Numerical Computing with MATLAB is a textbook for an introductory course in numerical methods, Matlab, and technical computing. The emphasis is on informed use of mathematic...
Cleve Moler
88
Voted
AC
2003
Springer
15 years 6 months ago
The Surprising Power of Epidemic Communication
We suggest that a combination of randomization and gossip communication can be used to overcome scalability barriers that limit the utility of many technologies for distributed sys...
Kenneth P. Birman
106
Voted
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
16 years 1 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
118
Voted
WDAG
2009
Springer
147views Algorithms» more  WDAG 2009»
15 years 7 months ago
Compact Routing in Power-Law Graphs
Abstract. We adapt the compact routing scheme by Thorup and Zwick to optimize it for power-law graphs. We analyze our adapted routing scheme based on the theory of unweighted rando...
Wei Chen, Christian Sommer 0002, Shang-Hua Teng, Y...
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 6 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum