Sciweavers

ASIACRYPT
2008
Springer
14 years 2 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
IJCNN
2000
IEEE
14 years 4 months ago
Fog Forecasting Using Self Growing Neural Network 'CombNET-II: ' A Solution for Imbalanced Training Sets Problem
This paper proposes a method to solve problem that comes with imbalanced training sets which is often seen in the practical applications. We modi ed Self Growing Neural Network Co...
Anto Satriyo Nugroho, Susumu Kuroyanagi, Akira Iwa...
FC
2009
Springer
95views Cryptology» more  FC 2009»
14 years 7 months ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...