Sciweavers

212 search results - page 19 / 43
» Universally Composable Commitments
Sort
View
138
Voted
TCC
2010
Springer
133views Cryptology» more  TCC 2010»
15 years 2 months ago
On the Necessary and Sufficient Assumptions for UC Computation
Abstract. We study the necessary and sufficient assumptions for universally composable (UC) computation, both in terms of setup and computational assumptions. We look at the common...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
101
Voted
MICRO
2006
IEEE
105views Hardware» more  MICRO 2006»
15 years 11 months ago
Distributed Microarchitectural Protocols in the TRIPS Prototype Processor
Growing on-chip wire delays will cause many future microarchitectures to be distributed, in which hardware resources within a single processor become nodes on one or more switched...
Karthikeyan Sankaralingam, Ramadass Nagarajan, Rob...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 8 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
135
Voted
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 11 months ago
Exploiting Our Computational Surroundings for Better Mobile Collaboration
Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available ...
João Pedro Barreto, Paulo Ferreira, Marc Sh...
132
Voted
ICCS
2004
Springer
15 years 10 months ago
Optimization of Collective Reduction Operations
A 5-year-profiling in production mode at the University of Stuttgart has shown that more than 40% of the execution time of Message Passing Interface (MPI) routines is spent in the...
Rolf Rabenseifner