Sciweavers

2108 search results - page 286 / 422
» Encrypted
Sort
View
EUROCRYPT
2000
Springer
15 years 6 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
99
Voted
EUROCRYPT
2000
Springer
15 years 6 months ago
A NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Éliane Jaulmes, Antoine Joux
119
Voted
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 6 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
101
Voted
IFIP
2000
Springer
15 years 6 months ago
Representing Human and Non-human Stakeholders: On Speaking with Authority
Information systems research is concerned with complex imbroglios of human and non-human components. As researchers, we need ways to represent the intricacies of the different sta...
Athanasia Pouloudi, Edgar A. Whitley
100
Voted
EUROPAR
1995
Springer
15 years 6 months ago
Bounds on Memory Bandwidth in Streamed Computations
The growing disparity between processor and memory speeds has caused memory bandwidth to become the performance bottleneck for many applications. In particular, this performance ga...
Sally A. McKee, William A. Wulf, Trevor C. Landon