Sciweavers

2702 search results - page 75 / 541
» Message from the Editor
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 4 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
PKC
2005
Springer
89views Cryptology» more  PKC 2005»
14 years 3 months ago
A New Related Message Attack on RSA
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ZN , one can compute x in O(e log2 e) ZN -o...
Oded Yacobi, Yacov Yacobi
ICFEM
1998
Springer
14 years 2 months ago
Interaction Interfaces - Towards a Scientific Foundation of a Methodological Usage of Message Sequence Charts
We introduce the formal notion of an interaction interface. Its purpose is to specify formally the interaction between two or more components that co-operate as subsystems of a di...
Manfred Broy, Ingolf Krüger
PODC
1990
ACM
14 years 2 months ago
Sharing Memory Robustly in Message-Passing Systems
Emulators that translate algorithms from the shared-memory model to two different message-passing models are presented. Both are achieved by implementing a wait-free, atomic, singl...
Hagit Attiya, Amotz Bar-Noy, Danny Dolev
JMLC
2000
Springer
14 years 1 months ago
Composable Message Semantics in Oberon
Most object-oriented languages offer a limited number of invocation semantics. At best, they define a default mode of synchronous invocation, plus some keywords to express addition...
Markus Hof