Sciweavers

679 search results - page 55 / 136
» Using decision problems in public key cryptography
Sort
View
ESORICS
2009
Springer
16 years 2 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
IACR
2011
82views more  IACR 2011»
14 years 1 months ago
Wild McEliece Incognito
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of se...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
RSCTC
2000
Springer
143views Fuzzy Logic» more  RSCTC 2000»
15 years 5 months ago
On Efficient Construction of Decision Trees from Large Databases
The main task in decision tree construction algorithms is to find the "best partition" of the set of objects. In this paper, we investigate the problem of optimal binary ...
Hung Son Nguyen
DEDS
2007
87views more  DEDS 2007»
15 years 1 months ago
Diagnosis of Discrete Event Systems Using Decentralized Architectures
Decentralized diagnosis of discrete event systems has received a lot of attention to deal with distributed systems or with systems that may be too large to be diagnosed by one cen...
Yin Wang, Tae-Sic Yoo, Stéphane Lafortune
EUROCRYPT
2008
Springer
15 years 3 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky