Sciweavers

876 search results - page 23 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
ASIACRYPT
2008
Springer
14 years 20 days ago
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Every public-key encryption scheme has to incorporate a certain amount of randomness into its ciphertexts to provide semantic security against chosen ciphertext attacks (IND-CCA). ...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
SAC
2003
ACM
14 years 3 months ago
WebSOGO: A Global Ontology for Describing Web Sources
Based on the limitations raised by existing approaches in the context of the Semantic Web, we propose a formalism, Web Sources Global Ontology (WebSOGO), a data meta-model for the...
Edna Ruckhaus, Maria-Esther Vidal
JOC
2010
124views more  JOC 2010»
13 years 9 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
GECCO
2004
Springer
14 years 4 months ago
On the Strength of Size Limits in Linear Genetic Programming
Abstract. Bloat is a common and well studied problem in genetic programming. Size and depth limits are often used to combat bloat, but to date there has been little detailed explor...
Nicholas Freitag McPhee, Alex Jarvis, Ellery Fusse...
WIOPT
2011
IEEE
13 years 2 months ago
Broadcasting with a battery limited energy harvesting rechargeable transmitter
—We consider the minimization of the transmission completion time with a battery limited energy harvesting transmitter in a two-user AWGN broadcast channel. The transmitter has ï...
Omur Ozel, Jing Yang, Sennur Ulukus