Treffer 1 - 20 von 235

1

RNS Modular Multiplication through Reduced Base Extensions
Bigou, Karim ; Tisserand, Arnaud ; Energy Efficient Computing ArchItectures with Embedded Reconfigurable Resources (CAIRN) ; et al.
ASAP - 25th IEEE International Conference on Application-specific Systems. :57-62

Zurich, Switzerland Residue Number System Montgomery Multiplicatio... Finite Field Arithmetic Asymmetric Cryptography Elliptic Curve Cryptogra...
Konferenz
Zu den Favoriten
2

Incremental Stream Processing using Computational Conflict-free Replicated Data Types
Navalho, David ; Duarte, Sérgio ; Preguiça, Nuno ; et al.
CloudDP '13 - 3rd International Workshop on Cloud Data and Platforms. :31-36

Prague, Czech Republic Stream Processing Distributed Processing Incredential Computation Real Time conflict-free replicated...
Konferenz
Zu den Favoriten
3

On-the-Fly Multi-Base Recoding for ECC Scalar Multiplication without Pre-Computations
Chabrier, Thomas ; Tisserand, Arnaud ; Energy Efficient Computing ArchItectures with Embedded Reconfigurable Resources (CAIRN) ; et al.
ARITH - 21st IEEE International Symposium on Computer Arithmetic. :219-228

Austin, TX, United State... elliptic curve cryptogra... scalar multiplication DBNS MBNS divisibility test
Konferenz
Zu den Favoriten
4

Solving BDD by Enumeration: An Update
Liu, Mingjie ; Nguyen, Phong Q. ; Beijing International Center for Mathematical Research (BiCMR) ; et al.
CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013. :293-309

San Francisco, United St... Lattices BDD LWE Enumeration ACM: E.: Data
Konferenz
Zu den Favoriten
5

Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures
Ducas, Léo ; Nguyen, Phong Q. ; Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities (CASCADE) ; et al.
ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security. :433-450

Beijing, China Signatures NTRU NTRUsign Cryptanalysis Lattices
Konferenz
Zu den Favoriten
6

Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic
Ducas, Léo ; Nguyen, Phong Q. ; Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities (CASCADE) ; et al.
ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security. :415-432

Beijing, China Signatures NTRU NTRUsign Gaussian sampling Lattices
Konferenz
Zu den Favoriten
7

Extended Security Arguments for Signature Schemes
El Yousfi Alaoui, Sidi Mohamed ; Dagdelen, Özgür ; Véron, Pascal ; et al.
Africacrypt 2012. :19-34

Ifrane, Morocco ACM: E.: Data E.3: DATA ENCRYPTION [INFO.INFO-CR]Computer S... Cryptography and Securit...
Konferenz
Zu den Favoriten
8

An improved threshold ring signature scheme based on error correcting codes
Cayrel, Pierre-Louis ; El Yousfi Alaoui, Sidi Mohamed ; Hoffmann, Gerhard ; et al.
International Workshop on the Arithmetic of Finite Fields. :45-63

Bochum, Germany ACM: E.: Data E.3: DATA ENCRYPTION [INFO.INFO-CR]Computer S... Cryptography and Securit...
Konferenz
Zu den Favoriten
9

Synchronizing Semantic Stores with Commutative Replicated Data Types
Ibáñez, Luis Daniel ; Skaf-Molli, Hala ; Molli, Pascal ; et al.
SWCS - Semantic Web Collaborative Spaces Workshop - 2012. :1091-1096

Lyon, France ACM: E.: Data E.1: DATA STRUCTURES ACM: H.: Information Sys... H.3: INFORMATION STORAGE... H.0: GENERAL
Konferenz
Zu den Favoriten
10

Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
Chen, Yuanmi ; Nguyen, Phong Q. ; Laboratoire d'informatique de l'école normale supérieure (LIENS) ; et al.
EUROCRYPT 2012. :502-519

Cambridge, United Kingdo... Fully-homomorphic encryp... cryptanalysis approximate gcd ACM: E.: Data E.3: DATA ENCRYPTION
Konferenz
Zu den Favoriten
11

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
Blazy, Olivier ; Pointcheval, David ; Vergnaud, Damien ; et al.
TCC 2012 - Ninth IACR Theory of Cryptography Conference. :94-112

Taormina, Italy oblivious signature-base... blind signatures smooth projective hash f... bilinear groups standard model with comm...
Konferenz
Zu den Favoriten
12

The dimension of ergodic random sequences
Hoyrup, Mathieu ; Theoretical adverse computations, and safety (CARTE) ; Centre Inria de l'Université de Lorraine ; et al.
STACS'12 (29th Symposium on Theoretical Aspects of Computer Science). :567-576

Paris, France Shannon-McMillan-Breiman... Martin-Löf random sequen... effective Hausdorff dime... compression rate entropy
Konferenz
Zu den Favoriten
13

Counting Points on Genus 2 Curves with Real Multiplication
Gaudry, Pierrick ; Kohel, David ; Smith, Benjamin ; et al.
ASIACRYPT 2011. :504-519

Seoul, South Korea ACM: E.: Data E.3: DATA ENCRYPTION E.3.2: Public key crypto... [MATH.MATH-NT]Mathematic... Number Theory [math.NT]
Konferenz
Zu den Favoriten
14

List-Decoding of Binary Goppa Codes up to the Binary Johnson Bound
Augot, Daniel ; Barbier, Morgan ; Couvreur, Alain ; et al.
IEEE Information Theory Workshop. :229-233

Paraty, Brazil ACM: E.: Data E.4: CODING AND INFORMAT... [INFO.INFO-IT]Computer S... Information Theory [cs.I... [MATH.MATH-IT]Mathematic...
Konferenz
Zu den Favoriten
15

The Dual Code of Points and t-Spaces in the Projective Space
De Boeck, Maarten ; Department of Mathematics [Gent/Ghent]
WCC 2011 - Workshop on coding and cryptography. :57-62

Paris, France Linear codes Projective spaces Small weight codewords ACM: E.: Data E.3: DATA ENCRYPTION
Konferenz
Zu den Favoriten
16

Class of Binary Generalized Goppa Codes Perfect in Weighted Hamming Metric
Bezzateev, Sergey ; Shekhunova, Natalia ; Saint-Petersburg State University of Aerospace Instrumentation (SUAI)
WCC 2011 - Workshop on coding and cryptography. :233-242

Paris, France ACM: E.: Data E.3: DATA ENCRYPTION E.4: CODING AND INFORMAT... ACM: G.: Mathematics of... G.2: DISCRETE MATHEMATIC...
Konferenz
Zu den Favoriten
17

A Relation Between Quasi-Cyclic Codes and 2-D Cyclic Codes
Guneri, Cem ; Özbudak, Ferruh ; Faculty of Engineering and Natural Sciences (Sabanci University) ; et al.
WCC 2011 - Workshop on coding and cryptography. :203-208

Paris, France ACM: E.: Data E.3: DATA ENCRYPTION E.4: CODING AND INFORMAT... ACM: G.: Mathematics of... G.2: DISCRETE MATHEMATIC...
Konferenz
Zu den Favoriten
18

A Complete Characterization of Irreducible Cyclic Orbit Codes
Trautmann, Anna-Lena ; Rosenthal, Joachim ; Universität Zürich [Zürich] = University of Zurich (UZH)
WCC 2011 - Workshop on coding and cryptography. :219-228

Paris, France ACM: E.: Data E.3: DATA ENCRYPTION E.4: CODING AND INFORMAT... ACM: G.: Mathematics of... G.2: DISCRETE MATHEMATIC...
Konferenz
Zu den Favoriten
19

List decoding of a class of affine variety codes
Geil, Olav ; Thomsen, Casper ; Department of Mathematical Sciences [Aalborg] ; et al.
WCC 2011 - Workshop on coding and cryptography. :263-272

Paris, France Schwartz- Zippel bound multiplicity list decoding Affine variety code ACM: E.: Data
Konferenz
Zu den Favoriten
20

On the weights of affine-variety codes and some Hermitian codes
Pellegrini, Marco ; Marcolla, Chiara ; Sala, Massimiliano ; et al.
WCC 2011 - Workshop on coding and cryptography. :273-282

Paris, France Affine-variety codes linear code distance minimum-weight word Hermitian code
Konferenz
Zu den Favoriten

Filter