Sciweavers

PKC
2015
Springer
30views Cryptology» more  PKC 2015»
8 years 3 months ago
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
We propose the first UC secure commitment scheme with (amortized) computational complexity linear in the size of the string committed to. After a preprocessing phase based on obli...
Ignacio Cascudo, Ivan Damgård, Bernardo Mach...
PKC
2015
Springer
12views Cryptology» more  PKC 2015»
8 years 3 months ago
A Polynomial-Time Attack on the BBCRS Scheme
The BBCRS scheme is a variant of the McEliece public-key encryption scheme where the hiding phase is performed by taking the inverse of a matrix which is of the form T +R where T i...
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich,...
ASPLOS
2015
ACM
8 years 3 months ago
Temporally Bounding TSO for Fence-Free Asymmetric Synchronization
This paper introduces a temporally bounded total store ordering (TBTSO) memory model, and shows that it enables nonblocking fence-free solutions to asymmetric synchronization prob...
Adam Morrison, Yehuda Afek
ASPLOS
2015
ACM
8 years 3 months ago
Memory Errors in Modern Systems: The Good, The Bad, and The Ugly
Several recent publications have shown that hardware faults in the memory subsystem are commonplace. These faults are predicted to become more frequent in future systems that cont...
Vilas Sridharan, Nathan DeBardeleben, Sean Blancha...
ASPLOS
2015
ACM
8 years 3 months ago
ApproxHadoop: Bringing Approximations to MapReduce Frameworks
We propose and evaluate a framework for creating and running approximation-enabled MapReduce programs. Specifically, we propose approximation mechanisms that fit naturally into t...
Iñigo Goiri, Ricardo Bianchini, Santosh Nag...
ASPLOS
2015
ACM
8 years 3 months ago
Monitoring and Debugging the Quality of Results in Approximate Programs
Energy efficiency is a key concern in the design of modern computer systems. One promising approach to energyefficient computation, approximate computing, trades off output accu...
Michael F. Ringenburg, Adrian Sampson, Isaac Acker...
ASPLOS
2015
ACM
8 years 3 months ago
Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the kernel to enjoy full supervisor privilege. The nested k...
Nathan Dautenhahn, Theodoros Kasampalis, Will Diet...
ASPLOS
2015
ACM
8 years 3 months ago
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
David Chisnall, Colin Rothwell, Robert N. M. Watso...
ASPLOS
2015
ACM
8 years 3 months ago
CommGuard: Mitigating Communication Errors in Error-Prone Parallel Execution
As semiconductor technology scales towards ever-smaller transistor sizes, hardware fault rates are increasing. Since important application classes (e.g., multimedia, streaming wor...
Yavuz Yetim, Sharad Malik, Margaret Martonosi
ASPLOS
2015
ACM
8 years 3 months ago
Chimera: Collaborative Preemption for Multitasking on a Shared GPU
The demand for multitasking on graphics processing units (GPUs) is constantly increasing as they have become one of the default components on modern computer systems along with tr...
Jason Jong Kyu Park, Yongjun Park, Scott A. Mahlke