Sciweavers

3190 search results - page 116 / 638
» cans 2011
Sort
View
FEDCSIS
2011
87views more  FEDCSIS 2011»
14 years 4 months ago
Enhanced CakES representing Safety Analysis results of Embedded Systems
—Nowadays, embedded systems are widely used. It is extremely difficult to analyze safety issues in embedded systems, to relate the safety analysis results to the actual parts, a...
Yasmin I. Al-Zokari, Daniel Schneider, Dirk Zeckze...
GANDC
2011
105views more  GANDC 2011»
14 years 4 months ago
Adjacent versus coincident representations of geospatial uncertainty: Which promote better decisions?
3D geological models commonly built to manage natural resources are much affected by uncertainty because most of the subsurface is inaccessible to direct observation. Appropriate ...
Thomas Viard, Guillaume Caumon, Bruno Lévy
IACR
2011
126views more  IACR 2011»
14 years 4 months ago
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC
The Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate public key cryptography (MPKC). In this paper, we introduce a new framework to study th...
Dongdai Lin, Jean-Charles Faugère, Ludovic ...
145
Voted
IACR
2011
161views more  IACR 2011»
14 years 4 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
123
Voted
IACR
2011
84views more  IACR 2011»
14 years 4 months ago
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
In this paper, we explore a general methodology for converting composite order pairingbased cryptosystems into the prime order setting. We employ the dual pairing vector space app...
Allison B. Lewko