Semantic Scholar uses AI to extract papers important to this topic.
A refreshing approach to the study of major Western philosophers. Introductory essays by noted scholars enliven each volume with… Expand Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without… Expand We propose the first fully homomorphic encryption scheme, solving an old open problem. Such a scheme allows one to compute… Expand In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech… Expand The authors review team research that has been conducted over the past 10 years. They discuss the nature of work teams in context… Expand Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the long-standing open problem of "circular… Expand Cryptosystems like AES and triple-DES are designed to encrypt a sequence of input bytes (the plaintext) into a sequence of output… Expand Preface 1. Introduction 2. One-dimensional maps 3. Nonchaotic multidimensional flows 4. Dynamical systems theory 5. Lyapunov… Expand In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits… Expand We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving… Expand