Sciweavers

1562 search results - page 181 / 313
» Mathematics, Cryptology, Security
Sort
View
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
TRUSTBUS
2010
Springer
13 years 6 months ago
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
MOC
2010
13 years 3 months ago
Dynamical systems method for solving nonlinear equations with monotone operators
A version of the Dynamical Systems Method (DSM) for solving ill-posed nonlinear equations with monotone operators in a Hilbert space is studied in this paper. An a posteriori stopp...
N. S. Hoang, Alexander G. Ramm
MOC
2010
13 years 3 months ago
On the numerical evaluation of Fredholm determinants
Some significant quantities in mathematics and physics are most naturally expressed as the Fredholm determinant of an integral operator, most notably many of the distribution funct...
Folkmar Bornemann
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 7 days ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner