نتایج جستجو برای: malleable

تعداد نتایج: 1939  

2012

As hardware becomes increasingly parallel and the availability of scalable parallel software improves, the problem of managing multiple multi-threaded applications (processes) becomes important. Malleable processes, which can vary the number of threads used as they run, enable sophisticated and flexible resource management. Although many existing applications parallelized for SMPs with parallel...

2017
Dana Dachman-Soled Mukul Kulkarni Aria Shahverdi

In a recent result, Dachman-Soled et al. (TCC ’15) proposed a new notion called locally decodable and updatable non-malleable codes, which informally, provides the security guarantees of a non-malleable code while also allowing for efficient random access. They also considered locally decodable and updatable non-malleable codes that are leakageresilient, allowing for adversaries who continually...

2016
Sanjam Garg Pratyay Mukherjee Omkant Pandey Antigoni Polychroniadou

We revisit the exact round complexity of secure computation in the multi-party and twoparty settings. For the special case of two-parties without a simultaneous message exchange channel, this question has been extensively studied and resolved. In particular, Katz and Ostrovsky (CRYPTO ’04) proved that five rounds are necessary and sufficient for securely realizing every two-party functionality ...

Journal: :Journal of the American Mathematical Society 2007

Journal: :The Journal of the Japan Institute of Metals 1948

Journal: :Philosophical Studies 2022

This paper introduces a body of research on Organizational Behavior and Industrial/Organizational Psychology (OB/IO) that expands the range empirical evidence relevant to ongoing character-situation debate. research, mostly neglected by moral philosophers, provides important insights move debate forward. First, OB/IO scholarship show social environments like organizations have significant power...

2001
Alfredo De Santis Giovanni Di Crescenzo Rafail Ostrovsky Giuseppe Persiano Amit Sahai

Non-Interactive Zero Knowledge (NIZK), introduced by Blum, Feldman, and Micali in 1988, is a fundamental cryptographic primitive which has attracted considerable attention in the last decade and has been used throughout modern cryptography in several essential ways. For example, NIZK plays a central role in building provably secure public-key cryptosystems based on general complexity-theoretic ...

Journal: :IACR Cryptology ePrint Archive 2015
Vipul Goyal Aayush Jain Dakshita Khurana

Motivated by the goal of removing trusted setup assumptions from cryptography, we introduce the notion of witness signatures. This primitive allows any party with a valid witness to an NP statement to sign a message on behalf of that statement. We also require these signatures to be unforgeable: that is, producing a signature on a new message (even given several message, signature pairs) should...

2013
Maciej Obremski Stefan Dziembowski

We introduce a new notion flexible extractor. It is a generalization of the standard concept of a two-source-extractor which require each of a sources to have some entropy, flexible extractor requires the sum of sources entropy to exceed fixed value. We distinguish between a strong and a weak flexible extractors and (similarly to two-source-extractors case) prove that every weak flexible extrac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید