Skip to search formSkip to main contentSkip to account menu

Security parameter

In cryptography, the security parameter is a variable that measures the input size of the computational problem. Both the resource requirements of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
SUMMARY We present a constant-size signature scheme under the CDH assumption. It has a tighter security reduction than any other… 
2019
2019
In this work, we introduce an integer version of ring-LWE (I-RLWE) over the polynomial rings and present a public key encryption… 
2014
2014
The popularity of network-based computation has increased during the past years. Storing data and performing computations using… 
2013
2013
A medication error is an adverse event or even a miss in the treatment process that may harm a patient. As a consequence of this… 
2009
2009
Private scalar product protocols have proved to beinteresting in various applications such as data mining, data integration… 
2007
2007
This paper proposes a new algorithm to consider cross correlation between noise and clean speech signal when autocorrelation… 
2003
2003
  • Damien Magoni
  • 2003
  • Corpus ID: 16765658
Since its inception in the '70s, the Internet has sustained a tremendous growth. The architectural choices made at the birth of… 
1999
1999
In coin tossing two remote participants want to share a uniformly distributed random bit. At the least in the quantum version… 
1997
1997
The ‘compound Poisson’ (CP) software reliability model was proposed previously by the first named author for time‐between‐failure… 
1995
1995
In this paper we introduce a new way of constructingA2-codes, i.e., authentication codes that protect against deceptions from an…