Sciweavers

2478 search results - page 63 / 496
» Universality in two dimensions
Sort
View
TCC
2005
Springer
115views Cryptology» more  TCC 2005»
15 years 4 months ago
The Universal Composable Security of Quantum Key Distribution
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper...
Michael Ben-Or, Michal Horodecki, Debbie W. Leung,...
TCC
2004
Springer
134views Cryptology» more  TCC 2004»
15 years 4 months ago
A Universally Composable Mix-Net
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute and decrypt ciphertexts, and re-encryption shuffles which permute and re-encrypt c...
Douglas Wikström
DBTEL
2001
Springer
117views Database» more  DBTEL 2001»
15 years 3 months ago
Toward Universal Information Models in Enterprise Management
The DMTF’s recent work on management information modeling in the IP world has highlighted that a number of problems are still unsolved in this important area of enterprise manage...
Jean-Philippe Martin-Flatin
STACS
2001
Springer
15 years 3 months ago
New Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing
Abstract. Ordered binary decision diagrams (OBDDs) nowadays belong to the most common representation types for Boolean functions. Although they allow important operations such as s...
Philipp Woelfel
SIGUCCS
2000
ACM
15 years 3 months ago
Changing the Face of Student Employment in IT at the University of Rochester
Student employees are the lifeblood of many IT organizations, and we often invest a lot of time, energy and resources to ensure their success and ours. Academic Technology Service...
Janak Gada, Jason Wagner