Sciweavers

132 search results - page 21 / 27
» On Public Key Encryption from Noisy Codewords
Sort
View
82
Voted
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
15 years 6 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā€...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 23 days ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
ASIACRYPT
2007
Springer
15 years 6 months ago
Multi-party Indirect Indexing and Applications
Abstract. We develop a new multi-party generalization of Naor-Nissim indirect indexing, making it possible for many participants to simulate a RAM machine with only poly-logarithmi...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
STOC
2005
ACM
198views Algorithms» more  STOC 2005»
16 years 1 months ago
On lattices, learning with errors, random linear codes, and cryptography
Our main result is a reduction from worst-case lattice problems such as GAPSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the `learnin...
Oded Regev
IACR
2011
88views more  IACR 2011»
14 years 10 days ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...