Sciweavers

658 search results - page 13 / 132
» Open problems in the security of learning
Sort
View
FPL
2003
Springer
88views Hardware» more  FPL 2003»
15 years 8 months ago
How Secure Are FPGAs in Cryptographic Applications?
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPG...
Thomas J. Wollinger, Christof Paar
COLT
1999
Springer
15 years 7 months ago
On Theory Revision with Queries
Abstract. A brief overview is given of recent results on theory revision with queries for propositional formulas, such as monotone and unate DNF, Horn formulas, read-once formulas,...
Robert H. Sloan, György Turán
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
CSFW
2010
IEEE
15 years 6 months ago
Automating Open Bisimulation Checking for the Spi Calculus
We consider the problem of automating open bisimulation checking for the spi-calculus, an extension of the pi-calculus with cryptographic primitives. The notion of open bisimulatio...
Alwen Tiu, Jeremy E. Dawson
154
Voted
JMLR
2010
143views more  JMLR 2010»
15 years 1 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...