Sciweavers

3190 search results - page 116 / 638
» cans 2011
Sort
View
FEDCSIS
2011
87views more  FEDCSIS 2011»
14 years 12 days ago
Enhanced CakES representing Safety Analysis results of Embedded Systems
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
112
Voted
GANDC
2011
105views more  GANDC 2011»
14 years 11 days ago
Adjacent versus coincident representations of geospatial uncertainty: Which promote better decisions?
3D geological models commonly built to manage natural resources are much affected by uncertainty because most of the subsurface is inaccessible to direct observation. Appropriate ...
Thomas Viard, Guillaume Caumon, Bruno Lévy
95
Voted
IACR
2011
126views more  IACR 2011»
14 years 10 days ago
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC
The Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate public key cryptography (MPKC). In this paper, we introduce a new framework to study th...
Dongdai Lin, Jean-Charles Faugère, Ludovic ...
IACR
2011
161views more  IACR 2011»
14 years 10 days ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
88
Voted
IACR
2011
84views more  IACR 2011»
14 years 10 days ago
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
In this paper, we explore a general methodology for converting composite order pairingbased cryptosystems into the prime order setting. We employ the dual pairing vector space app...
Allison B. Lewko