Abbas El Gamal and Mark Schnitzer
نویسندگان
چکیده
منابع مشابه
Pulse-Modulated Analog Neuron Circuits BOYD FOWLER AND ABBAS EL GAMAL
Abslract. Analog neuron circuits based on both frequency modulation and pulse modulation are investigated. The circuits are compared in terms of size, power, performance, and reliability; frequency modulation shows advantages in each area. Test circuits were designed and fabricated in 2/zm CMOS technology. The frequency modulated neuron has an operational frequency of 3.125 MHz and a dynamic ra...
متن کاملOn desynchronised multivariate El Gamal algorithm
Families of stable cyclic groups of nonlinear polynomial transformations of affine spaces K over general commutative ring K of increasing with n order can be used in the key exchange protocols and related to them El Gamal multivariate cryptosystems. We suggest to use high degree of noncommutativity of affine Cremona group and modify multivariate El Gamal algorithm via the usage of conjugations ...
متن کاملA Note on the Malleability of the El Gamal Cryptosystem
The homomorphic property of the El Gamal cryptosystem is useful in the construction of efficient protocols. It is believed that only a small class of transformations of cryptotexts are feasible to compute. In the program of showing that these are the only computable transformations we rule out a large set of natural transformations.
متن کاملEfficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption
We propose a set of primitives based on El Gamal encryption that can be used to construct efficient multiparty computation protocols for certain low-complexity functions. In particular, we show how to privately count the number of true Boolean disjunctions of literals and pairwise exclusive disjunctions of literals. Applications include efficient two-party protocols for computing the Hamming di...
متن کاملUnification modulo a property of the El Gamal Encryption Scheme
Equational Unification has recently been applied in the field of formal analysis of cryptographic protocols. Formal methods have been very useful in detecting nontrivial flaws in protocols and also to verify their correctness; see Meadows [7] for a survey of formal verification of cryptographic protocols. Terms in this approach are often assumed to be in the free algebra, i.e., the function sym...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Methods
سال: 2011
ISSN: 1548-7091,1548-7105
DOI: 10.1038/nmeth.1713