• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 6 of 6

DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process

by Carlo Curino, Hyun Jin, Moon Alin Deutsch, Carlo Zaniolo, C. Curino (b, H. J. Moon, A. Deutsch, C. Zaniolo
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract - Add to MetaCart
applications. In addition to labor saving, the ben-efits delivered by these advances are many and include reliable prediction of outcome, minimization of downtime, system-produced documentation, and support for archiving, historical queries, and provenance. The PRISM/PRISM++ system delivers these benefits

Quantum Algorithms Factoring Integers

by Discrete Log
"... There exist quantum algorithms that can solve certain problems substantially faster than any classical algorithm. ..."
Abstract - Add to MetaCart
There exist quantum algorithms that can solve certain problems substantially faster than any classical algorithm.

POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR

by Dominique Tschopp, Prof E. Telatar, Prof S. Diggavi, Prof M. Grossglauser, Prof J. -y, Le Boudec, Prof M. Mitzenmacher, Prof S. Shakkottai
"... 2010 to my wife, Joyce, and my family...- Résumé- ..."
Abstract - Add to MetaCart
2010 to my wife, Joyce, and my family...- Résumé-

und Computeralgebra (CDC) Algebraic methods in analyzing lightweight cryptographic symmetric primitives

by Theoretische Informatik Kryptographie, Michael Walter, Prof Johannes, A. Buchmann, Dr. Stanislav Bulygin, Tag Der Einreichung Acknowledgement, Dr. Stanislav Bulygin, Prof Johannes Buchmann
"... Algebraic methods in analyzing ..."
Abstract - Add to MetaCart
Algebraic methods in analyzing

Saskatoon By

by Dmytro Dyachuk
"... In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree ..."
Abstract - Add to MetaCart
In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case of classical cryptanalytic advances or progress on the development of quantum computers the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of sig-nature schemes based on the hardness of certain lattices problems which are assumed to be intractable by quantum computers. Due to significant research advancements in recent years, lattice-based schemes have now become practical and appear to be a very viable alternative to number-theoretic cryptography. In this paper we focus on recent developments and the current state-of-the-art in lattice-based digital signatures and provide a comprehensive survey discussing signature schemes with respect to practicality. Additionally, we discuss future research areas that are essential for the continued development of lattice-based cryptography.
Results 1 - 6 of 6
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University