Sciweavers

4463 search results - page 563 / 893
» computer 2000
Sort
View
145
Voted
ANTS
2000
Springer
87views Algorithms» more  ANTS 2000»
15 years 9 months ago
Reduction in Purely Cubic Function Fields of Unit Rank One
This paper analyzes reduction of fractional ideals in a purely cubic function field of unit rank one. The algorithm is used for generating all the reduced principal fractional ide...
Renate Scheidler
ASIACRYPT
2000
Springer
15 years 9 months ago
A Note on Security Proofs in the Generic Model
A discrete-logarithm algorithm is called generic if it does not exploit the specific representation of the cyclic group for which it is supposed to compute discrete logarithms. Su...
Marc Fischlin
138
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Provably Secure Metering Scheme
Abstract. Naor and Pinkas introduced metering schemes at Eurocrypt ’98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to cons...
Wakaha Ogata, Kaoru Kurosawa
127
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Attack for Flash MIX
A MIX net takes a list of ciphertexts (c1, · · · , cN ) and outputs a permuted list of the plaintexts (m1, · · · , mN ) without revealing the relationship between (c1, · · ...
Masashi Mitomo, Kaoru Kurosawa
134
Voted
BPM
2000
Springer
111views Business» more  BPM 2000»
15 years 9 months ago
A Knowledge-Based Approach for Designing Robust Business Processes
This chapter describes a novel knowledge-based methodology and computer toolset for helping business process designers and participants better manage exceptions (unexpected deviati...
Chrysanthos Dellarocas, Mark Klein