Sciweavers

209 search results - page 26 / 42
» ideal 2009
Sort
View
ASIACRYPT
2009
Springer
15 years 4 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
ASIACRYPT
2009
Springer
15 years 4 months ago
Simple Adaptive Oblivious Transfer without Random Oracle
Adaptive oblivious transfer (adaptive OT) schemes have wide applications such as oblivious database searches, secure multiparty computation and etc. It is a two-party protocol whic...
Kaoru Kurosawa, Ryo Nojima
ASIACRYPT
2009
Springer
15 years 4 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
WEBI
2009
Springer
15 years 4 months ago
"All You Can Eat" Ontology-Building: Feeding Wikipedia to Cyc
In order to achieve genuine web intelligence, building some kind of large general machine-readable conceptual scheme (i.e. ontology) seems inescapable. Yet the past 20 years have ...
Samuel Sarjant, Catherine Legg, Michael Robinson, ...
CIKM
2009
Springer
15 years 4 months ago
Topic and keyword re-ranking for LDA-based topic modeling
Topic-based text summaries promise to help average users quickly understand a text collection and derive insights. Recent research has shown that the Latent Dirichlet Allocation (...
Yangqiu Song, Shimei Pan, Shixia Liu, Michelle X. ...