نتایج جستجو برای: early abort technique

تعداد نتایج: 1270850  

Journal: :IACR Cryptology ePrint Archive 2006
Sanjit Chatterjee Palash Sarkar

At Eurocrypt 2005, Waters proposed an efficient identity based encryption (IBE) scheme. One drawback of this scheme is that the size of the public parameter is rather large. Our first contribution is a generalization of Waters scheme. In particular, we show that there is an interesting trade-off between the tightness of the security reduction and smallness of the public parameter size. For a gi...

Journal: :Journal of physics 2022

The high luminosity upgrade of Large Hadron Collider will increase its by an order magnitude increasing with it the density particles on detector. For protecting inner detectors experiments and for monitoring delivered luminosity, a radiation hard beam monitor is being developed. Text describes proposed system’s principles operation design. It details poly-crystalline chemical vapor deposition ...

Journal: :ACM transactions on privacy and security 2022

We introduce cryptographic protocols for securely and efficiently computing the cardinality of set union intersection. Our private set-cardinality (PSC) are designed setting in which a large parties distributed system makes observations, small with more resources higher reliability aggregates observations. PSC allows secure useful statistics gathering privacy-preserving systems. For example, it...

2016
Ricardo Quislant Eladio Gutiérrez Emilio L. Zapata Oscar G. Plata

Current industry proposals for Hardware Transactional Memory (HTM) focus on best-effort solutions (BE-HTM) where hardware limits are imposed on transactions. These designs may show a significant performance degradation due to high contention scenarios and different hardware and operating system limitations that abort transactions, e.g. cache overflows, hardware and software exceptions, etc. To ...

1997
Fernando Pedone Rachid Guerraoui André Schiper

This paper presents a fault-tolerant lazy replication protocol that ensures 1-copy serializability at a relatively low cost. Unlike eager replication approaches, our protocol enables local transaction execution and does not lead to any deadlock situation. Compared to previous lazy replication approaches, we significantly reduce the abort rate of transactions and we do not require any reconcilia...

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

Journal: :Distributed Computing 2022

Abstract Transaction Memory (TM) is a concurrency control abstraction that allows the programmer to specify blocks of code be executed atomically as transactions. However, since transactional can contain just about any operation attention must paid state shared variables at given time. E.g., contrary database transaction, if TM transaction reads stale value it may execute dangerous operations, ...

Journal: :JOURNAL OF THE JAPAN SOCIETY FOR AERONAUTICAL AND SPACE SCIENCES 2009

Journal: :The American journal of clinical hypnosis 2005
Alex Iglesias Adam Iglesias

An individual developed a lifestyle-limiting case of Panic Disorder that threatened to interfere with her raison d'etre: To participate in the exclusive lifestyle of her community. The panic episodes started to cripple her social calendar and as the "season" came into full swing her coveted role of chairwoman of various philanthropic functions came into peril. A variant of awake-alert hypnosis ...

1997
E. Friedman A. Gal J. Mareš

Total (σ T) and reaction (σ R) cross sections are derived self consistently from the attenuation cross sections measured in transmission experiments at the AGS for K + on 6 Li, C, Si and Ca in the momentum range of 500-700 MeV/c by using a V opt = t ef f (ρ)ρ optical potential. Self consistency requires, for the KN in-medium t matrix, that Im t ef f (ρ) increases linearly with the average nucle...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید