Sciweavers

2303 search results - page 58 / 461
» The Cryptographic Abstract Machine
Sort
View
128
Voted
IJISEC
2006
108views more  IJISEC 2006»
15 years 2 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
146
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Enhanced wireless channel authentication using time-synched link signature
Abstract— Wireless link signature is a physical layer authentication mechanism, which uses the unique wireless channel characteristics between a transmitter and a receiver to pro...
Yao Liu, Peng Ning
150
Voted
EACL
2006
ACL Anthology
15 years 4 months ago
Phrase-Based Backoff Models for Machine Translation of Highly Inflected Languages
We propose a backoff model for phrasebased machine translation that translates unseen word forms in foreign-language text by hierarchical morphological abstractions at the word an...
Mei Yang, Katrin Kirchhoff
137
Voted
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
16 years 3 months ago
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Abstract. This paper is devoted to the design of fast parallel accelerators for the cryptographic Tate pairing in characteristic three over supersingular elliptic curves. We propos...
Jean-Luc Beuchat, Jérémie Detrey, Ni...
147
Voted
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
15 years 9 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...