Sciweavers

JOC
2016
49views more  JOC 2016»
9 years 11 months ago
Automata Evaluation and Text Search Protocols with Simulation-Based Security
ded abstract of this paper was published in the proceedings of PKC 2010. Automata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗ Carmit Haza...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
JOC
2016
48views more  JOC 2016»
9 years 11 months ago
Fast Cryptography in Genus 2
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared to the standardized genus 1 curves, or elliptic curves, arithmetic on genus 2 ...
Joppe W. Bos, Craig Costello, Hüseyin Hisil, ...
JOC
2016
48views more  JOC 2016»
9 years 11 months ago
Secret-Sharing Schemes for Very Dense Graphs
A secret-sharing scheme realizes a graph if every two vertices connected by an edge can reconstruct the secret while every independent set in the graph does not get any informatio...
Amos Beimel, Oriol Farràs, Yuval Mintz
JOC
2016
62views more  JOC 2016»
9 years 11 months ago
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary ...
Yehuda Lindell
JOC
2016
52views more  JOC 2016»
9 years 11 months ago
Limits on the Usefulness of Random Oracles
In the random oracle model, parties are given oracle access to a random function (i.e., a uniformly chosen function from the set of all functions), and are assumed to have unbound...
Iftach Haitner, Eran Omri, Hila Zarosim
JNSM
2016
59views more  JNSM 2016»
9 years 11 months ago
A Self-adaptive Algorithm for Topology Matching in Unstructured Peer-to-Peer Networks
Peer-to-Peer networks are overlay networks that are constructed over underlay networks. These networks can be structured or unstructured. In these networks, peers choose their nei...
Ali Mohammad Saghiri, Mohammad Reza Meybodi
JNSM
2016
58views more  JNSM 2016»
9 years 11 months ago
Reliability and Survivability Analysis of Data Center Network Topologies
Rodrigo De Souza Couto, Stefano Secci, Miguel Elia...
JNSM
2016
49views more  JNSM 2016»
9 years 11 months ago
An Analytical Model for Estimating Cloud Resources of Elastic Services
Khaled Salah, Khalid Elbadawi, Raouf Boutaba
JNS
2016
84views more  JNS 2016»
9 years 11 months ago
Improving Prediction Skill of Imperfect Turbulent Models Through Statistical Response and Information Theory
Turbulent dynamical systems with a large phase space and a high degree of instabilities are ubiquitous in climate science and engineering applications. Statistical uncertainty quan...
Andrew J. Majda, Di Qi