Sciweavers

679 search results - page 37 / 136
» Using decision problems in public key cryptography
Sort
View
CONCURRENCY
2010
80views more  CONCURRENCY 2010»
15 years 2 months ago
Publication and consumption of caBIG data services using .NET
The cancer Biomedical Informatics Grid (caBIG) is revolutionizing the way medical researchers share information and collaborate. A key to caBIG's continued success will be in...
Marty Humphrey, Jie Li, Norm Beekwilder
AAAI
2007
15 years 6 months ago
Optimizing Anthrax Outbreak Detection Using Reinforcement Learning
The potentially catastrophic impact of a bioterrorist attack makes developing effective detection methods essential for public health. In the case of anthrax attack, a delay of ho...
Masoumeh T. Izadi, David L. Buckeridge
169
Voted
ISPEC
2011
Springer
14 years 7 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
EUROCRYPT
2010
Springer
15 years 8 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
EUROCRYPT
2007
Springer
15 years 10 months ago
Cryptanalysis of the Sidelnikov Cryptosystem
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effecti...
Lorenz Minder, Amin Shokrollahi