Sciweavers

346 search results - page 5 / 70
» The Secret Santa Problem
Sort
View
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
14 years 6 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...
CSR
2008
Springer
13 years 11 months ago
Cryptanalysis of Stickel's Key Exchange Scheme
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (t...
Vladimir Shpilrain
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 4 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
FOGA
1992
13 years 11 months ago
Relative Building-Block Fitness and the Building Block Hypothesis
The building-block hypothesis states that the GA works well when short, low-order, highly-fit schemas recombine to form even more highly fit higher-order schemas. The ability to p...
Stephanie Forrest, Melanie Mitchell
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
14 years 4 months ago
Evolving problem heuristics with on-line ACGP
Genetic Programming uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees. ...
Cezary Z. Janikow