Sciweavers

212 search results - page 19 / 43
» Universally Composable Commitments
Sort
View
TCC
2010
Springer
133views Cryptology» more  TCC 2010»
13 years 5 months ago
On the Necessary and Sufficient Assumptions for UC Computation
Abstract. We study the necessary and sufficient assumptions for universally composable (UC) computation, both in terms of setup and computational assumptions. We look at the common...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
MICRO
2006
IEEE
105views Hardware» more  MICRO 2006»
14 years 1 months ago
Distributed Microarchitectural Protocols in the TRIPS Prototype Processor
Growing on-chip wire delays will cause many future microarchitectures to be distributed, in which hardware resources within a single processor become nodes on one or more switched...
Karthikeyan Sankaralingam, Ramadass Nagarajan, Rob...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 2 months ago
Exploiting Our Computational Surroundings for Better Mobile Collaboration
Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available ...
João Pedro Barreto, Paulo Ferreira, Marc Sh...
ICCS
2004
Springer
14 years 1 months ago
Optimization of Collective Reduction Operations
A 5-year-profiling in production mode at the University of Stuttgart has shown that more than 40% of the execution time of Message Passing Interface (MPI) routines is spent in the...
Rolf Rabenseifner