Sciweavers

4463 search results - page 567 / 893
» computer 2000
Sort
View
ESOP
2000
Springer
15 years 8 months ago
Alias Types
Abstract. Linear type systems allow destructive operations such as object deallocation and imperative updates of functional data structures. These operations and others, such as th...
Frederick Smith, David Walker, J. Gregory Morriset...
141
Voted
EUROCRYPT
2000
Springer
15 years 8 months ago
Efficient Proofs that a Committed Number Lies in an Interval
Alice wants to prove that she is young enough to borrow money from her bank, without revealing her age. She therefore needs a tool for proving that a committed number lies in a spe...
Fabrice Boudot
133
Voted
EUROCRYPT
2000
Springer
15 years 8 months ago
A NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Éliane Jaulmes, Antoine Joux
150
Voted
FAABS
2000
Springer
15 years 8 months ago
Formal Agent Development: Framework to System
Much work in the field of agent-based systems has tended to focus on either the development of practical applications of agent systems on the one hand, or the development of sophis...
Mark d'Inverno, Michael Luck
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 8 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...