Results 1  10
of
10,697
Wavelets in Statistics: Beyond the Standard Assumptions
 Phil. Trans. Roy. Soc. Lond. A
, 1999
"... this paper, attention has been focused on methods that treat coe#cients at least as if they were independent. However, it is intuitively clear that if one coe#cient in the wavelet array is nonzero, then it is more likely #in some appropriate sense# that neighbouring coe#cients will be also. One way ..."
Abstract

Cited by 9 (2 self)
 Add to MetaCart
this paper, attention has been focused on methods that treat coe#cients at least as if they were independent. However, it is intuitively clear that if one coe#cient in the wavelet array is nonzero, then it is more likely #in some appropriate sense# that neighbouring coe#cients will be also. One way of incorporating this notion is by some form of block thresholding, where coe#cients are considered in neighbouring blocks; see for example Hall et al. #1998# and Cai & Silverman #1998#. An obvious question for future consideration is integrate the ideas of block thresholding and related methods within the range of models and methods considered in this paper.
Wavelets in Statistics: Beyond the Standard Assumptions
, 1999
"... this paper, attention has been focused on methods that treat coefficients at least as if they were independent. However, it is intuitively clear that if one coefficient in the wavelet array is nonzero, then it is more likely (in some appropriate sense) that neighbouring coefficients will be also. On ..."
Abstract
 Add to MetaCart
this paper, attention has been focused on methods that treat coefficients at least as if they were independent. However, it is intuitively clear that if one coefficient in the wavelet array is nonzero, then it is more likely (in some appropriate sense) that neighbouring coefficients will be also. One way of incorporating this notion is by some form of block thresholding, where coefficients are considered in neighbouring blocks; see for example Hall et al.
Limits of Provable Security From Standard Assumptions
, 2011
"... We show that the security of some wellknown cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selectivedecommitment, the “onemore ” discrete logarithm assumption) cannot be based on any standard assumption using a Turing ..."
Abstract

Cited by 11 (3 self)
 Add to MetaCart
We show that the security of some wellknown cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selectivedecommitment, the “onemore ” discrete logarithm assumption) cannot be based on any standard assumption using a
StructurePreserving Signatures from Standard Assumptions, Revisited?
"... Abstract. Structurepreserving signatures (SPS) are pairingbased signatures where all the messages, signatures and public keys are group elements, with numerous applications in publickey cryptography. We present new, simple and improved SPS constructions under standard assumptions via a conceptual ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Abstract. Structurepreserving signatures (SPS) are pairingbased signatures where all the messages, signatures and public keys are group elements, with numerous applications in publickey cryptography. We present new, simple and improved SPS constructions under standard assumptions via a
Threearea statements: Standard assumptions for biogeographic analysis
 Syst. Zool
, 1991
"... Abstract.—An implementation is explored for standard assumptions (zero and one) for historical biogeographic analysis based on threearea statements specified by widespread taxa and nodes of taxon cladograms. Analysis of simple examples suggests that threearea statements permit a better measure of ..."
Abstract

Cited by 14 (0 self)
 Add to MetaCart
Abstract.—An implementation is explored for standard assumptions (zero and one) for historical biogeographic analysis based on threearea statements specified by widespread taxa and nodes of taxon cladograms. Analysis of simple examples suggests that threearea statements permit a better measure
Limits of security reductions from standard assumptions
 In STOC
, 2011
"... We show that the security of some wellknown cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selectivedecommitment, the “onemore ” discrete logarithm assumption) cannot be based on any standard assumption using a Turi ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
We show that the security of some wellknown cryptographic protocols, primitives and assumptions (e.g., the Schnorr identification scheme, commitments secure under adaptive selectivedecommitment, the “onemore ” discrete logarithm assumption) cannot be based on any standard assumption using a
A Message Recognition Protocol Based on Standard Assumptions
"... Abstract. We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the random oracle model or are based on nonstandard assumptions. Incorporating random coins, we propose a new MRP us ..."
Abstract
 Add to MetaCart
Abstract. We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the random oracle model or are based on nonstandard assumptions. Incorporating random coins, we propose a new MRP
Efficient (Anonymous) Compact HIBE From Standard Assumptions
"... Abstract. We present two hierarchical identitybased encryption (HIBE) schemes, denoted as H1 and H2, from Type3 pairings with constant sized ciphertexts. Scheme H1 achieves anonymity while H2 is nonanonymous. The constructions are obtained by extending the IBE scheme recently proposed by Jutla an ..."
Abstract
 Add to MetaCart
and Roy (Asiacrypt 2013). Security is based on the standard decisional Symmetric eXternal DiffieHellman (SXDH) assumption. In terms of provable security properties, previous direct constructions of constantsize ciphertext HIBE had one or more of the following drawbacks: security in the weaker model
Fully distributed threshold RSA under standard assumptions
 ADVANCES IN CRYPTOLOGY — ASIACRYPT 2001, VOLUME ??? OF LNCS
, 2001
"... The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a price in terms of efficiency, we do not want any compromise of the security assumptions that we make. Recently Shoup propo ..."
Abstract

Cited by 24 (3 self)
 Add to MetaCart
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a price in terms of efficiency, we do not want any compromise of the security assumptions that we make. Recently Shoup
Computational Soundness for Standard Assumptions of Formal Cryptography
, 2004
"... The DolevYao model is a useful and wellknown framework in which to analyze security protocols. However, it models the messages of the protocol at a very high level and makes extremely strong assumptions about the power of the adversary. The computational model of cryptography, on the other hand, t ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
assumptions of the DolevYao model into the computational setting, and 3. We demonstrated that this condition is satisfied by a standard definition of computational encryption security called plaintext awareness. In this work, we consider this result and strengthen it in four ways: Firstly, we propose a
Results 1  10
of
10,697