Sciweavers

699 search results - page 6 / 140
» mc 2008
Sort
View
SCN
2008
Springer
194views Communications» more  SCN 2008»
13 years 9 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce
DCC
2008
IEEE
14 years 9 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
ICDCS
2008
IEEE
14 years 4 months ago
MC2: Multiple Clients on a Multilevel Cache
In today’s networked storage environment, it is common to have a hierarchy of caches where the lower levels of the hierarchy are accessed by multiple clients. This sharing can h...
Gala Yadgar, Michael Factor, Kai Li, Assaf Schuste...
TRECVID
2008
13 years 11 months ago
K-Space at TRECVid 2008
Peter Wilkins, Daragh Byrne, Gareth J. F. Jones, H...
COMPUTER
2008
114views more  COMPUTER 2008»
13 years 9 months ago
Automated Code Review Tools for Security
Gary McGraw