Sciweavers

269 search results - page 42 / 54
» random 2001
Sort
View
ASIACRYPT
2001
Springer
14 years 2 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
14 years 2 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
CIA
2001
Springer
14 years 2 months ago
Equilibria Strategies for Selecting Sellers and Satisfying Buyers
We consider marketplaces where buyers and sellers iteratively encounter to trade. Given some specific trade conditions, the question that we address is what strategies should buy...
Claudia V. Goldman, Sarit Kraus, Onn Shehory
COCO
2001
Springer
149views Algorithms» more  COCO 2001»
14 years 2 months ago
Quantum versus Classical Learnability
Motivated by recent work on quantum black-box query complexity, we consider quantum versions of two wellstudied models of learning Boolean functions: Angluin’s model of exact le...
Rocco A. Servedio, Steven J. Gortler
CRYPTO
2001
Springer
116views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Nonlinear Vector Resilient Functions
An (n, m, k)-resilient function is a function f : Fn 2 → Fm 2 such that every possible output m-tuple is equally likely to occur when the values of k arbitrary inputs are fixed ...
Jung Hee Cheon