Sciweavers

1379 search results - page 44 / 276
» codes 2009
Sort
View
ASIACRYPT
2009
Springer
15 years 10 months ago
Security Bounds for the Design of Code-Based Cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Matthieu Finiasz, Nicolas Sendrier
ATAL
2009
Springer
15 years 10 months ago
agentTool III: from process definition to code generation
The agentTool III (aT3 ) development environment is built on the Eclipse platform and provides traditional model creation tools to support the analysis, design, and implementation...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...
CONCUR
2009
Springer
15 years 10 months ago
Flow Policy Awareness for Distributed Mobile Code
Several programming constructs have recently been proposed with the purpose of enabling the programmer to encode declassifying information flows within a program that complies wi...
Ana Almeida Matos
SGAI
2009
Springer
15 years 10 months ago
From Source Code to Runtime Behaviour: Software Metrics Help to Select the Computer Architecture
The decision which hardware platform to use for a certain application is an important problem in computer architecture. This paper reports on a study where a data-mining approach i...
Frank Eichinger, David Kramer, Klemens Böhm, ...
AAECC
2009
Springer
138views Algorithms» more  AAECC 2009»
15 years 8 months ago
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Abstract. We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) ...
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki ...