Sciweavers

36 search results - page 6 / 8
» Improved Attacks on Full GOST
Sort
View
EUROCRYPT
2012
Springer
12 years 6 days ago
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
Jean-Sébastien Coron, David Naccache, Mehdi...
ISSTA
2012
ACM
12 years 7 days ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
FDG
2009
ACM
14 years 1 months ago
Influence points for tactical information in navigation meshes
Good artificial intelligence for strategy and first person shooter games requires tactical information. Tactical information assists agents in choosing appropriate places to place...
Frederick W. P. Heckel, G. Michael Youngblood, D. ...
EUROSYS
2010
ACM
14 years 2 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 3 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...