We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,047 results
  1. Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM

    We propose a novel, efficient and secure Key Encapsulation Mechanism (KEM) transformation in the random oracle model. Furthermore, we demonstrate its...
    Ziyi Li, **anhui Lu, ... Bao Li in Information Security and Cryptology
    Conference paper 2024
  2. Tighter Construction of Tight Büchi Automata

    Tight automata are useful in providing the shortest counterexample in LTL model checking and also in constructing a maximally satisfying strategy in...
    Conference paper Open access 2024
  3. Tighter Security for Generic Authenticated Key Exchange in the QROM

    We give a tighter security proof for authenticated key exchange (AKE) protocols that are generically constructed from key encapsulation mechanisms...
    Jiaxin Pan, Benedikt Wagner, Runzhi Zeng in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  4. Ring-Based Identity Based Encryption – Asymptotically Shorter MPK and Tighter Security

    This work constructs an identity based encryption from the ring learning with errors assumption (RLWE), with shorter master public keys and tighter...
    Parhat Abla, Feng-Hao Liu, ... Zhedong Wang in Theory of Cryptography
    Conference paper 2021
  5. Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model

    Hofheinz et al. (TCC 2017) proposed several key encapsulation mechanism (KEM) variants of Fujisaki-Okamoto (FO) transformation, including...
    Jiangxia Ge, Tianshu Shan, Rui Xue in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  6. Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model

    In (STOC, 2008), Gentry, Peikert, and Vaikuntanathan proposed the first identity-based encryption (GPV-IBE) scheme based on a post-quantum...

    Shuichi Katsumata, Shota Yamada, Takashi Yamakawa in Journal of Cryptology
    Article 06 January 2021
  7. A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions

    Abelian group actions appear in several areas of cryptography, especially isogeny-based post-quantum cryptography. A natural problem is to relate the...
    Steven Galbraith, Yi-Fu Lai, Hart Montgomery in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  8. Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols

    We give new, fully-quantitative and concrete bounds that justify the SIGMA and TLS 1.3 key exchange protocols not just in principle, but in practice....
    Hannah Davis, Felix Günther in Applied Cryptography and Network Security
    Conference paper 2021
  9. Heterogeneous sets in dimensionality reduction and ensemble learning

    We present a general framework for dealing with set heterogeneity in data and learning problems, which is able to exploit low complexity components....

    Henry W. J. Reeve, Ata Kabán, Jakramate Bootkrajang in Machine Learning
    Article Open access 28 October 2022
  10. QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model

    Xagawa and Yamakawa (PQCrypto 2019) proved the transformation $$\mathsf...
    Xu Liu, Mingqiang Wang in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  11. Recent Advances in Practical Data Reduction

    Over the last two decades, significant advances have been made in the design and analysis of fixed-parameter algorithms for a wide variety of...
    Faisal N. Abu-Khzam, Sebastian Lamm, ... Darren Strash in Algorithms for Big Data
    Chapter Open access 2022
  12. Partial-order reduction in reachability-based response-time analyses of limited-preemptive DAG tasks

    Response-time analysis (RTA) has been a means to evaluate the temporal correctness of real-time systems since the 1970 s. While early analyses were...

    Sayra Ranjha, Pourya Gohari, ... Mitra Nasri in Real-Time Systems
    Article Open access 08 June 2023
  13. Ebola optimization search algorithm for the enhancement of devops and cycle time reduction

    One of the main complications with Team Foundation Server (TFS) is that it was developed even before user experience was made a top priority. The...

    S. R. DileepKumar, Juby Mathew in International Journal of Information Technology
    Article 09 March 2023
  14. An Algorithm for the Formal Reduction of Differential Equations as Over-Approximations

    Models of complex systems often consist of state variables with structurally similar dynamics that differ in the specific values of some parameters....
    Giuseppe Squillace, Mirco Tribastone, ... Andrea Vandin in Quantitative Evaluation of Systems
    Conference paper 2022
  15. Maintaining Trust in Reduction: Preserving the Accuracy of Quantities of Interest for Lossy Compression

    As the growth of data sizes continues to outpace computational resources, there is a pressing need for data reduction techniques that can...
    Conference paper 2022
  16. Accelerating local SGD for non-IID data using variance reduction

    Distributed stochastic gradient descent and its variants have been widely adopted in the training of machine learning models, which apply multiple...

    **anfeng Liang, Shuheng Shen, ... Zhen Pan in Frontiers of Computer Science
    Article 09 August 2022
  17. Efficient mining high average-utility itemsets with effective pruning strategies and novel list structure

    High utility itemset mining can mine all itemsets that meet the minimum utility threshold set by the decision maker, thus becomes a popular and...

    Gufeng Li, Tao Shang, Yinling Zhang in Applied Intelligence
    Article 06 July 2022
  18. A fast MILP solver for high-level synthesis based on heuristic model reduction and enhanced branch and bound algorithm

    Modeling high-level synthesis (HLS) as mixed integer linear programming (MILP) affords the opportunity to integrate constraints and optimization...

    Mina Mirhosseini, Mahmood Fazlali, ... Jeong-A Lee in The Journal of Supercomputing
    Article 06 March 2023
  19. Variance reduction for additive functionals of Markov chains via martingale representations

    In this paper, we propose an efficient variance reduction approach for additive functionals of Markov chains relying on a novel discrete-time...

    D. Belomestny, E. Moulines, S. Samsonov in Statistics and Computing
    Article 27 January 2022
  20. Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model

    A hash-and-sign signature based on a preimage-sampleable function (Gentry et al., STOC 2008) is secure in the quantum random oracle model if the...
    Haruhisa Kosuge, Keita Xagawa in Public-Key Cryptography – PKC 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.