Sciweavers

3238 search results - page 396 / 648
» Not Enough Points Is Enough
Sort
View
88
Voted
EUROCRYPT
2004
Springer
15 years 4 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
FGR
2004
IEEE
131views Biometrics» more  FGR 2004»
15 years 4 months ago
Active Morphable Model: An Efficient Method for Face Analysis
Multidimensional Morphable Model is a powerful model to analyze and synthesize human faces. However, the stochastic gradient descent algorithm adopted to match the Morphable Model...
Xun Xu, Changshui Zhang, Thomas S. Huang
123
Voted
CONCUR
2006
Springer
15 years 4 months ago
Event Structure Semantics for Nominal Calculi
Event structures have been used for giving true concurrent semantics to languages and models of concurrency such as CCS, Petri nets and graph grammars. Although certain nominal cal...
Roberto Bruni, Hernán C. Melgratti, Ugo Mon...
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet