Sciweavers

401 search results - page 38 / 81
» Delegatable Functional Signatures
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
EUROCRYPT
2006
Springer
14 years 12 days ago
The Function Field Sieve in the Medium Prime Case
In this paper, we study the application of the function field sieve algorithm for computing discrete logarithms over finite fields of the form Fqn when q is a medium-sized prime po...
Antoine Joux, Reynald Lercier
NAR
2006
68views more  NAR 2006»
13 years 8 months ago
Panzea: a database and resource for molecular and functional diversity in the maize genome
Serving as a community resource, Panzea (http:// www.panzea.org) is the bioinformatics arm of the Molecular and Functional Diversity in the Maize Genome project. Maize, a classica...
Wei Zhao, Payan Canaran, Rebecca Jurkuta, Theresa ...
DCC
2001
IEEE
14 years 8 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 2 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002