Sciweavers

PLOSCB
2016
68views more  PLOSCB 2016»
10 years 23 days ago
Recovery of Dynamics and Function in Spiking Neural Networks with Closed-Loop Control
There is a growing interest in developing novel brain stimulation methods to control disease-related aberrant neural activity and to address basic neuroscience questions. Conventi...
Ioannis Vlachos, Taskin Deniz, Ad Aertsen, Arvind ...
PLOSCB
2016
88views more  PLOSCB 2016»
10 years 23 days ago
Neurally Encoding Time for Olfactory Navigation
In Jun Park, Andrew M. Hein, Yuriy V. Bobkov, Matt...
PLOSCB
2016
69views more  PLOSCB 2016»
10 years 23 days ago
Somato-dendritic Synaptic Plasticity and Error-backpropagation in Active Dendrites
In the last decade dendrites of cortical neurons have been shown to nonlinearly combine synaptic inputs by evoking local dendritic spikes. It has been suggested that these nonline...
Mathieu Schiess, Robert Urbanczik, Walter Senn
PLOSCB
2016
57views more  PLOSCB 2016»
10 years 23 days ago
Feedbacks, Bifurcations, and Cell Fate Decision-Making in the p53 System
The p53 transcription factor is a regulator of key cellular processes including DNA repair, cell cycle arrest, and apoptosis. In this theoretical study, we investigate how the com...
Beata Hat, Marek Kochanczyk, Marta N. Bogdal, Toma...
PKC
2016
Springer
76views Cryptology» more  PKC 2016»
10 years 23 days ago
Asynchronous Secure Multiparty Computation in Constant Time
In the setting of secure multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function. It is well known that if the communication model ...
Ran Cohen
PKC
2016
Springer
71views Cryptology» more  PKC 2016»
10 years 23 days ago
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
Adaptively secure Multi-Party Computation (MPC) is an essential and fundamental notion in cryptography. In this work, we construct Universally Composable (UC) MPC protocols that ar...
Ivan Damgård, Antigoni Polychroniadou, Vanis...
PKC
2016
Springer
64views Cryptology» more  PKC 2016»
10 years 23 days ago
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
In PKC 1999, Fujisaki and Okamoto showed how to convert any public key encryption (PKE) scheme secure against chosen plaintext attacks (CPA) to a PKE scheme which is secure against...
Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro H...
PKC
2016
Springer
52views Cryptology» more  PKC 2016»
10 years 23 days ago
KDM-Security via Homomorphic Smooth Projective Hashing
We present new frameworks for constructing public-key encryption schemes satisfying key-dependent message (KDM) security and that yield efficient, universally composable oblivious...
Hoeteck Wee
PKC
2016
Springer
63views Cryptology» more  PKC 2016»
10 years 23 days ago
Delegatable Functional Signatures
We introduce delegatable functional signatures (DFS) which support the delegation of signing capabilities to another party, called the evaluator, with respect to a functionality F...
Michael Backes 0001, Sebastian Meiser 0001, Domini...
PKC
2016
Springer
63views Cryptology» more  PKC 2016»
10 years 23 days ago
ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM
Abstract. This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a sign...
Andreas Hülsing, Joost Rijneveld, Peter Schwa...