Sciweavers

209 search results - page 2 / 42
» ideal 2009
Sort
View
PKC
2010
Springer
210views Cryptology» more  PKC 2010»
14 years 2 months ago
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem
Abstract. In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC’2009 [3]. This system is based on an unusual problem in multivariate cr...
Jean-Charles Faugère, Pierre-Jean Spaenleha...
ISAAC
2009
Springer
121views Algorithms» more  ISAAC 2009»
14 years 5 months ago
Generalized Reduction to Compute Toric Ideals
Toric ideals have many applications including solving integer programs. Several algorithms for computing the toric ideal of an integer matrix are available in the literature. Since...
Deepanjan Kesh, Shashank K. Mehta
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
The Collision Security of Tandem-DM in the Ideal Cipher Model
We prove that Tandem-DM, one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resist...
Jooyoung Lee, Martijn Stam, John P. Steinberger
DPHOTO
2009
108views Hardware» more  DPHOTO 2009»
13 years 8 months ago
IDEAL: an image pre-processing architecture for high-end professional DSC applications
We developed and implemented a flexible image pre-processing concept to achieve an image sub-system for top-end professional digital still camera applications that ensures the hig...
Auke van der Heide, Takashi Urano, Frank Polderdij...
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
14 years 5 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry