Sciweavers

2303 search results - page 42 / 461
» The Cryptographic Abstract Machine
Sort
View
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
125
Voted
ESORICS
2002
Springer
16 years 4 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
MOZ
2004
Springer
15 years 10 months ago
The Metagrammar Compiler: An NLP Application with a Multi-paradigm Architecture
1) the Warren’s Abstract Machine and (2) constraints on finite set.
Denys Duchier, Joseph Le Roux, Yannick Parmentier
ICICS
2007
Springer
15 years 11 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak
OTM
2007
Springer
15 years 11 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page