Sciweavers

1786 search results - page 50 / 358
» The Structure of Factor Oracles
Sort
View
PODC
2003
ACM
15 years 9 months ago
An asynchronous protocol for distributed computation of RSA inverses and its applications
This paper presents an efficient asynchronous protocol to compute RSA inverses with respect to a public RSA modulus N whose factorization is secret and shared among a group of pa...
Christian Cachin
IJISEC
2006
108views more  IJISEC 2006»
15 years 4 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
14 years 18 hour ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
CVPR
2007
IEEE
15 years 8 months ago
Improving Part based Object Detection by Unsupervised, Online Boosting
Detection of objects of a given class is important for many applications. However it is difficult to learn a general detector with high detection rate as well as low false alarm r...
Bo Wu, Ram Nevatia
CC
1998
Springer
100views System Software» more  CC 1998»
15 years 4 months ago
Symmetric Alternation Captures BPP
We introduce the natural class SP 2 containing those languages which may be expressed in terms of two symmetric quanti ers. This class lies between P 2 and P 2 P 2 and naturall...
Alexander Russell, Ravi Sundaram