Search Results - "Kilian, Joe"
-
1
The Security of the Cipher Block Chaining Message Authentication Code
Published in Journal of computer and system sciences (01-12-2000)“…Let F be some block cipher (eg., DES) with block length l. The cipher block chaining message authentication code (CBC MAC) specifies that an m-block message…”
Get full text
Journal Article -
2
How to protect DES against exhaustive key search (an analysis of DESX)
Published in Journal of cryptology (2001)“…The block cipher \DESX is defined by \DESXk.k1.k2(x) = k2\xor \DESk (k1\xor x) , where \xor denotes bitwise exclusive-or. This construction was first suggested…”
Get full text
Journal Article -
3
The Dynamic Universality of Sigmoidal Neural Networks
Published in Information and computation (10-07-1996)“…We investigate the computational power of recurrent neural networks that apply the sigmoid activation functionσ(x)=[2/(1+e−x)]−1. These networks are…”
Get full text
Journal Article -
4
Asymptotic distribution for the birthday problem with multiple coincidences, via an embedding of the collision process
Published in Random structures & algorithms (01-05-2016)“…We study the random variable B(c, n), which counts the number of balls that must be thrown into n equally‐sized bins in order to obtain c collisions. The…”
Get full text
Journal Article -
5
Heuristics for Semirandom Graph Problems
Published in Journal of computer and system sciences (01-12-2001)“…We consider semirandom graph models for finding large independent sets, colorings, and bisections in graphs. These models generate problem instances by…”
Get full text
Journal Article -
6
Secure spread spectrum watermarking for multimedia
Published in IEEE transactions on image processing (01-12-1997)“…This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio,…”
Get full text
Journal Article -
7
Zero Knowledge and the Chromatic Number
Published in Journal of computer and system sciences (01-10-1998)“…We present a new technique, inspired by zero-knowledge proof systems, for proving lower bounds on approximating the chromatic number of a graph. To illustrate…”
Get full text
Journal Article -
8
Betting Boolean-style: a framework for trading in securities based on logical formulas
Published in Decision Support Systems (01-03-2005)“…We develop a framework for trading in compound securities: financial instruments that pay off contingent on the outcomes of arbitrary statements in…”
Get full text
Journal Article Conference Proceeding -
9
An efficient noninteractive zero-knowledge proof system for NP with general assumptions
Published in Journal of cryptology (1998)“…We consider noninteractive zero-knowledge proofs in the shared random string model proposed by Blum et al. [5]. Until recently there was a sizable polynomial…”
Get full text
Journal Article -
10
Communication vs. Computation
Published in Computational complexity (01-05-2007)Get full text
Journal Article -
11
Finding OR in a noisy broadcast network
Published in Information processing letters (31-01-2000)“…We consider a broadcast network of n processors in which each bit transmitted by each processor is received by each other processor via a noisy channel. Each…”
Get full text
Journal Article -
12
Lower Bounds For Concurrent Zero Knowledge
Published in Combinatorica (Budapest. 1981) (01-03-2005)Get full text
Journal Article -
13
GUEST EDITOR'S FOREWORD
Published in Journal of computer and system sciences (01-08-2002)Get full text
Journal Article -
14
Zero-knowledge sets
Published in 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings (2003)“…We show how a polynomial-time prover can commit to an arbitrary finite set S of strings so that, later on, he can, for any string x, reveal with a proof…”
Get full text
Conference Proceeding -
15
On Concurrent and Resettable Zero-Knowledge Proofs for NP
Published 03-07-2001“…A proof is concurrent zero-knowledge if it remains zero-knowledge when many copies of the proof are run in an asynchronous environment, such as the Internet…”
Get full text
Journal Article -
16
Lower Bounds for Zero-knowledge on the Internet
Published 02-07-2001“…We consider zero knowledge interactive proofs in a richer, more realistic communication environment. In this setting, one may simultaneously engage in many…”
Get full text
Journal Article -
17
Zero-knowledge with log-space verifiers
Published in [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science (1988)“…Interactive proof systems are considered in which the best set of possible verifiers is restricted to the class of probabilistic log-space automata. A. Condon…”
Get full text
Conference Proceeding -
18
The organization of permutation architectures with bused interconnections
Published in IEEE transactions on computers (01-11-1990)“…The problem of efficiently permuting data stored in VLSI chips in accordance with a predetermined set of permutations is explored. By connecting chips with…”
Get full text
Journal Article -
19
On the complexity of bounded-interaction and noninteractive zero-knowledge proofs
Published in Proceedings 35th Annual Symposium on Foundations of Computer Science (1994)“…We consider the basic cryptographic primitive known as zero-knowledge proofs on committed bits. In this primitive, a prover P commits to a set of bits, and…”
Get full text
Conference Proceeding -
20
Lower bounds for zero knowledge on the Internet
Published in Annual Symposium on Foundations of Computer Science (1998)“…We consider zero knowledge interactive proofs in a richer, more realistic communication environment. In this setting, one may simultaneously engage in many…”
Get full text
Conference Proceeding Journal Article