Sciweavers

1786 search results - page 50 / 358
» The Structure of Factor Oracles
Sort
View
PODC
2003
ACM
15 years 6 months ago
An asynchronous protocol for distributed computation of RSA inverses and its applications
This paper presents an efficient asynchronous protocol to compute RSA inverses with respect to a public RSA modulus N whose factorization is secret and shared among a group of pa...
Christian Cachin
IJISEC
2006
108views more  IJISEC 2006»
15 years 23 days ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
124
Voted
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 8 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
125
Voted
CVPR
2007
IEEE
15 years 4 months ago
Improving Part based Object Detection by Unsupervised, Online Boosting
Detection of objects of a given class is important for many applications. However it is difficult to learn a general detector with high detection rate as well as low false alarm r...
Bo Wu, Ram Nevatia
94
Voted
CC
1998
Springer
100views System Software» more  CC 1998»
15 years 14 days ago
Symmetric Alternation Captures BPP
We introduce the natural class SP 2 containing those languages which may be expressed in terms of two symmetric quanti ers. This class lies between P 2 and P 2 P 2 and naturall...
Alexander Russell, Ravi Sundaram