48 research outputs found

    Nuclear-powered cardiac pacemakers

    Get PDF
    The radiological hazards and benefit assessment of sup238sup 238Pu-powered cardiac pacemakers are analyzed. (TFD

    Hard Instances of the Constrained Discrete Logarithm Problem

    Get PDF
    The discrete logarithm problem (DLP) generalizes to the constrained DLP, where the secret exponent xx belongs to a set known to the attacker. The complexity of generic algorithms for solving the constrained DLP depends on the choice of the set. Motivated by cryptographic applications, we study sets with succinct representation for which the constrained DLP is hard. We draw on earlier results due to Erd\"os et al. and Schnorr, develop geometric tools such as generalized Menelaus' theorem for proving lower bounds on the complexity of the constrained DLP, and construct sets with succinct representation with provable non-trivial lower bounds

    Ultrasonic Characterization of Canine Myocardium Contraction

    No full text

    Shrinking the keys of discrete-log-type lossy trapdoor functions

    Get PDF
    To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about 螛(位 2) group elements for a reduction from the decisional Diffie-Hellman assumption (where 位 is a security parameter). We propose two realizations of lossy trapdoor functions that achieve public key size of only 螛(位) group elements in bilinear groups, with a reduction from the decisional Bilinear Diffie-Hellman assumption. Our first construction achieves this result at the expense of a long common reference string of 螛(位 2) elements, albeit reusable in multiple LTDF instantiations. Our second scheme also achieves public keys of size 螛(位), entirely in the standard model and in particular without any reference string, at the cost of a slightly more involved construction. The main technical novelty, developed for the second scheme, is a compact encoding technique for generating compressed representations of certain sequences of group elements for the public parameters

    Efficient Universal Padding Techniques for Multiplicative Trapdoor OneWay Permutation

    No full text
    Abstract. Coron et al. proposed the ES-based scheme PSS-ES which realizes an encryption scheme and a signature scheme with a unique padding technique and key pair. The security of PSS-ES as an encryption scheme is based on the partial-domain one-wayness of the encryption permutation. In this paper, we propose new ES schemes OAEP-ES, OAEP++-ES, and REACT-ES, and prove their security under the assumption of only the one-wayness of encryption permutation. OAEP-ES, OAEP++-ES, and REACT-ES suit practical implementation because they use the same padding technique for encryption and for signature, and their security proof guarantees that we can prepare one key pair to realize encryption and signature in the same way as PSS-ES. Since one-wayness is a weaker assumption than partial-domain one-wayness, the proposed schemes offer tighter security than PSS-ES. Hence, we conclude that OAEP-ES, OAEP++-ES, and REACT-ES are more effective than PSS-ES. REACT-ES is the most practical approach in terms of the tightness of security and communication efficiency.

    Proactive Byzantine Quorum Systems

    No full text
    corecore