Sciweavers

986 search results - page 12 / 198
» Generalized Goal Programming: polynomial methods and applica...
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 7 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
ICASSP
2010
IEEE
15 years 2 months ago
2-D two-fold symmetric circular shaped filter design with homomorphic processing application
A design method of a linear-phased, two-dimensional (2-D), twofold symmetric circular shaped filter is presented in this paper. Although the proposed method designs a non-separab...
Akila J. Seneviratne, Ha Hoang Kha, Hoang Duong Tu...
ICALP
2001
Springer
15 years 8 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
ISSAC
2007
Springer
177views Mathematics» more  ISSAC 2007»
15 years 10 months ago
Component-level parallelization of triangular decompositions
We discuss the parallelization of algorithms for solving polynomial systems symbolically by way of triangular decompositions. We introduce a component-level parallelism for which ...
Marc Moreno Maza, Yuzhen Xie
POPL
2012
ACM
13 years 11 months ago
Sound predictive race detection in polynomial time
Data races are among the most reliable indicators of programming errors in concurrent software. For at least two decades, Lamport’s happens-before (HB) relation has served as th...
Yannis Smaragdakis, Jacob Evans, Caitlin Sadowski,...