Sciweavers

465 search results - page 39 / 93
» Programmable Hash Functions and Their Applications
Sort
View
ICAIL
2003
ACM
15 years 3 months ago
The use of legal knowledge-based systems in public administration: what can go wrong?
In recent years, practical applications of legal knowledge-based systems have become increasingly common. This raises the issue of their functioning in practice and their actual in...
Hugo de Bruin, Henry Prakken, Jörgen S. Svens...
FOCS
2006
IEEE
15 years 4 months ago
On the Compressibility of NP Instances and Cryptographic Applications
We study compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problem...
Danny Harnik, Moni Naor
FLOPS
2008
Springer
14 years 11 months ago
On-Demand Refinement of Dependent Types
Dependent types are useful for statically checking detailed specifications of programs and detecting pattern match or array bounds errors. We propose a novel approach to applicatio...
Hiroshi Unno, Naoki Kobayashi
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
13 years 12 days ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy
ASIACRYPT
2010
Springer
14 years 8 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...