Sciweavers

1249 search results - page 77 / 250
» Limitations of the Even-Mansour Construction
Sort
View
CCS
2007
ACM
14 years 4 months ago
Attribute-based encryption with non-monotonic access structures
We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes wer...
Rafail Ostrovsky, Amit Sahai, Brent Waters
ATAL
2004
Springer
14 years 3 months ago
The Insufficiency of Formal Design Methods - The Necessity of an Experimental Approach - for the Understanding and Control of Co
We highlight the limitations of formal methods by exhibiting two results in recursive function theory: that there is no effective means of finding a program that satisfies a given...
Bruce Edmonds, Joanna Bryson
ICCS
2004
Springer
14 years 3 months ago
Graphical and Computational Representation of Groups
An important part of the computer science is focused on the links that can be established between group theory and graph theory. Cayley graphs can establish such a link but meet so...
Alain Bretto, Luc Gillibert
IEEEPACT
2002
IEEE
14 years 2 months ago
Speculative Alias Analysis for Executable Code
Optimizations performed at link time or directly applied to final program executables have received increased attention in recent years. Such low-level optimizations can benefit...
Manel Fernández, Roger Espasa
CIE
2010
Springer
14 years 2 months ago
Higher-Order Containers
Containers are a semantic way to talk about strictly positive types. In previous work it was shown that containers are closed under various constructions including products, coprod...
Thorsten Altenkirch, Paul Levy, Sam Staton