Sciweavers

2303 search results - page 42 / 461
» The Cryptographic Abstract Machine
Sort
View
128
Voted
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
108
Voted
ESORICS
2002
Springer
16 years 2 months ago
Computational Probabilistic Non-interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
Michael Backes, Birgit Pfitzmann
MOZ
2004
Springer
15 years 7 months ago
The Metagrammar Compiler: An NLP Application with a Multi-paradigm Architecture
1) the Warren’s Abstract Machine and (2) constraints on finite set.
Denys Duchier, Joseph Le Roux, Yannick Parmentier
ICICS
2007
Springer
15 years 8 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak
98
Voted
OTM
2007
Springer
15 years 8 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page