Sciweavers

851 search results - page 121 / 171
» Random constructions and density results
Sort
View
COLING
2002
14 years 11 months ago
Word Sense Disambiguation using Static and Dynamic Sense Vectors
It is popular in WSD to use contextual information in training sense tagged data. Co-occurring words within a limited window-sized context support one sense among the semantically...
Jong-Hoon Oh, Key-Sun Choi
EUROCRYPT
2009
Springer
16 years 13 days ago
A Leakage-Resilient Mode of Operation
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to ? but weaker than ? a pseudorandom function: for wPRFs one only requires that the output is pseudorandom...
Krzysztof Pietrzak
ASIACRYPT
2009
Springer
15 years 6 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 6 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
ISPEC
2005
Springer
15 years 5 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo