Sciweavers

2303 search results - page 4 / 461
» The Cryptographic Abstract Machine
Sort
View
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 7 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
CRYPTO
2008
Springer
109views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Adaptive One-Way Functions and Applications
Abstract. We introduce new and general complexity theoretic hardumptions. These assumptions abstract out concrete properties of a random oracle and are significantly stronger than ...
Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
FPCA
1991
13 years 11 months ago
Making Abstract Machines Less Abstract
Hannan. Making Abstract Machines Less Abstract . In Proc. of FPCA'91, LNCS 523, pages
John Hannan
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
VMCAI
2004
Springer
14 years 22 days ago
History-Dependent Scheduling for Cryptographic Processes
Abstract. This paper presents history-dependent scheduling, a new technique for reducing the search space in the verification of cryptographic protocols. This technique allows the...
Vincent Vanackère