Sciweavers

95
Voted
PKC
2016
Springer
71views Cryptology» more  PKC 2016»
9 years 11 months ago
Chosen-Ciphertext Security from Subset Sum
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of...
Sebastian Faust, Daniel Masny, Daniele Venturi
96
Voted
PKC
2016
Springer
55views Cryptology» more  PKC 2016»
9 years 11 months ago
Universally Composable Direct Anonymous Attestation
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic algorithms that has been deployed in practice. In spite of this, and the long body of work on the subjec...
Jan Camenisch, Manu Drijvers, Anja Lehmann
106
Voted
PKC
2016
Springer
63views Cryptology» more  PKC 2016»
9 years 11 months ago
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models
Abstract Invalid curve attacks are a well-known class of attacks against implementations of elliptic curve cryptosystems, in which an adversary tricks the cryptographic device into...
Samuel Neves, Mehdi Tibouchi
PIEEE
2016
58views more  PIEEE 2016»
9 years 11 months ago
Reconstructing Time-Dependent Dynamics
—The usefulness of the information contained in biomedical data relies heavily on the reliability and accuracy of the methods used for its extraction. The conventional assumption...
Philip T. Clemson, Gemma Lancaster, Aneta Stefanov...
PIEEE
2016
44views more  PIEEE 2016»
9 years 11 months ago
A Review of Relational Machine Learning for Knowledge Graphs
Relational machine learning studies methods for the statistical analysis of relational, or graph-structured, data. In this paper, we provide a review of how such statistical model...
Maximilian Nickel, Kevin Murphy 0002, Volker Tresp...
PIEEE
2016
50views more  PIEEE 2016»
9 years 11 months ago
Implementing Randomized Matrix Algorithms in Parallel and Distributed Environments
Jiyan Yang, Xiangrui Meng, Michael W. Mahoney
PIEEE
2016
67views more  PIEEE 2016»
9 years 11 months ago
Machine Learning in Genomic Medicine: A Review of Computational Problems and Data Sets
Michael K. K. Leung, Andrew Delong, Babak Alipanah...
PIEEE
2016
61views more  PIEEE 2016»
9 years 11 months ago
Resource Allocation for Statistical Estimation
Statistical estimation in many contemporary settings involves the acquisition, analysis, and aggregation of datasets from multiple sources, which can have significant difference...
Quentin Berthet, Venkat Chandrasekaran
PIEEE
2016
81views more  PIEEE 2016»
9 years 11 months ago
Taking the Human Out of the Loop: A Review of Bayesian Optimization
Bobak Shahriari, Kevin Swersky, Ziyu Wang, Ryan P....
PIEEE
2016
46views more  PIEEE 2016»
9 years 11 months ago
Magging: Maximin Aggregation for Inhomogeneous Large-Scale Data
Large-scale data analysis poses both statistical and computational problems which need to be addressed simultaneously. A solution is often straightforward if the data are homogene...
Peter Buhlmann, Nicolai Meinshausen