Sciweavers

9 search results - page 2 / 2
» joc 2010
Sort
View
JOC
2010
123views more  JOC 2010»
13 years 5 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
JOC
2010
82views more  JOC 2010»
13 years 5 months ago
A Verifiable Secret Shuffle of Homomorphic Encryptions
Abstract. A shuffle consists of a permutation and re-encryption of a set of input ciphertexts. One application of shuffles is to build mix-nets. We suggest an honest verifier zero-...
Jens Groth
JOC
2011
94views more  JOC 2011»
13 years 1 months ago
Mutual Information Analysis: a Comprehensive Study
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and kno...
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff,...
IRFC
2010
Springer
14 years 3 months ago
Combining Wikipedia-Based Concept Models for Cross-Language Retrieval
Abstract. As a low-cost ressource that is up-to-date, Wikipedia recently gains attention as a means to provide cross-language brigding for information retrieval. Contradictory to a...
Benjamin Roth, Dietrich Klakow