Filters








15 Hits in 9.5 sec

Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model [chapter]

Mihir Bellare, Viet Tung Hoang
2015 Lecture Notes in Computer Science  
Forms of PKE resisting these have in fact already been defined, namely deterministic public-key encryption (D-PKE) [4] and hedged public-key encryption (H-PKE) [5] .  ...  This paper provides the first efficient, standard-model, fully-secure schemes for some related and challenging forms of public-key encryption (PKE), namely deterministic and hedged PKE.  ...  Part of the work was done when Hoang was working at UCSD, supported in part by NSF grants CNS-1116800 and CNS-1228890.  ... 
doi:10.1007/978-3-662-46803-6_21 fatcat:22ld7gamxzhbnicgdfbi37c244

Hedging Public-Key Encryption in the Real World [chapter]

Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
2017 Lecture Notes in Computer Science  
We also propose a new security notion, MM-CCA, which generalizes traditional IND-CCA to admit imperfect randomness. Like IND-CCA, and unlike IND-CDA, our notion gives the adversary the public key.  ...  The idea actually goes back to the Fujisaki-Okamoto transform for turning CPA-secure encryption into CCA-secure encryption, and is also used to build deterministic PKE schemes.  ...  We also thank Mihir Bellare and the anonymous reviewers for valuable feedback, as well as Joseph Choi and Animesh Chhotaray for bug fixes.  ... 
doi:10.1007/978-3-319-63697-9_16 fatcat:xphbmdkgbrh2hjpiejndsfwf7i

Public-Seed Pseudorandom Permutations [chapter]

Pratik Soni, Stefano Tessaro
2017 Lecture Notes in Computer Science  
This paper initiates the study of standard-model assumptions on permutations -or more precisely, on families of permutations indexed by a public seed.  ...  ., making it random and accessible, as an oracle, to all parties.  ...  Acknowledgments We wish to thank John Retterer-Moore for his involvement in an earlier stage of this project. We also thank the EUROCRYPT '17 anonymous reviewers for their insightful feedback.  ... 
doi:10.1007/978-3-319-56614-6_14 fatcat:2d7xhdjlnfedzcsdq22pcqyt24

Peripheral state persistence for transiently-powered systems

Gautier Berthou, Tristan Delizy, Kevin Marquet, Tanguy Risset, Guillaume Salagnac
2017 2017 Global Internet of Things Summit (GIoTS)  
The rsa64 test case uses iterative left-to-right modular exponentiation of multipleprecision integers to encrypt a 64-bit message under a 64-bit public key and 17bit exponent.  ...  The IMD then generates a random value to be used as a session key and broadcasts it as a modulated sound wave.  ... 
doi:10.1109/giots.2017.8016243 dblp:conf/giots/BerthouDMRS17 fatcat:r2vbvtjlnvdlxkkt6ldrw43l6m

The cathedral and the bazaar

Eric Raymond
1999 Knowledge, Technology and Policy  
Glen Vandenburg <glv@vanderburg.org> pointeed out the importance of self-selection in contributor populations and suggested the fruitful idea that much development rectifies 'bugs of omission'; Daniel  ...  Particular thanks to Jeff Dutky <dutky@wam.umd.edu>, who suggested the "debugging is parallelizable" formulation, and helped develop the analysis that proceeds from it.  ...  The Cathedral and the Bazaar Linux is subversive.  ... 
doi:10.1007/s12130-999-1026-0 fatcat:6oo3faw4ffhgbko2xcgvuai4f4

The Democratization of Artificial Intelligence [chapter]

Andreas Sudmann
2019 The Democratization of Artificial Intelligence  
BBC (http:// www.bbc.com/capital/story/20190307-the-hidden-armies-that-power-the-in ternets-new-stars) [Last access 24.4.2019].  ...  Tsing, Anna (2015): A Feminist Approach to the Anthropocene: Earth Stalked by Man. Lecture held at the Barnard College for Women. (https://www.youtube. com/watch?  ...  Acknowledgments This volume is the first publication of a newly founded book series entitled "AI Critique".  ... 
doi:10.1515/9783839447192-001 fatcat:7yjb2m5p7jdt7dvkpzsuttbvf4

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
Essays about corruption, money laundering, crime, and international finance.  ...  The Macedonian Police in that period was not in control of the whole territory of the country, especially the western part of Macedonia, which was predominantly  ...  Therefore, the question of mutual monitoring and control is a key issue in collusive oligopolies."  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

Chapter 16. Intellectual, Argumentative, and Informational Affordances of Public Forums: Potential Contributions to Academic Learning [chapter]

Chris M. Anson
2017 Social Writing/Social Media: Publics, Presentations, and Pedagogies  
Printed in the United States of America Library of Congress Cataloging-in-Publication Data Names: Walls, Douglas M., 1973-editor. | Vie, Stephanie, editor.  ...  Title: Social writing/social media : publics, presentations, and pedagogies / edited by Douglas M. Walls and Stephanie Vie.  ...  Walls, Stephanie Vie, Beth Allison Barr, and Theresa Kennedy for their insightful feedback. Finally, we express appreciation to Shane Alexander and Scott Varda for their steadfast love and support.  ... 
doi:10.37514/per-b.2017.0063.2.16 fatcat:2shjxaektbcxdnwjznivwxb4wq

Disrupting surveillance: critical software design-led practice to obfuscate and reveal surveillance economies and knowledge monopolies [article]

Hadi Mehrpouya, University Of Edinburgh, Chris Speed, Craig Martin
2021
This thesis investigates the taken for granted ways our interactions with surveillance capitalism infrastructures are transforming our individual and collective beings and in turn the new cyborg ontologies  ...  The four critical design works included in this investigation offer alternative possibilities for critical engagement with, and interpretation of, [...]  ...  Moreover, in the broader sense one of the key components of critical design is obfuscation and subversion of dominant power/knowledge regimes.  ... 
doi:10.7488/era/1188 fatcat:dqzfuxychfafdabx4yhz3c5ioe

good and real Demystifying Paradoxes from Physics to Ethics Good and Real Good and Real Demystifying Paradoxes from Physics to Ethics

Gary Drescher, Gary Drescher, A Book
unpublished
No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the  ...  To decrypt the encrypted message, we must know the key that was used to encrypt it.  ...  In the cipher, we encrypt a message by providing a key-just some series of numbers-and aligning each next letter in the message with each next number in the key.  ... 
fatcat:hr6g6srxjnhl5pdbpmfxlzo3xq

Strategies for Unbridled Data Dissemination: An Emergency Operations Manual

Nikita Mazurov
2015
The undertaken methodological approach thus leads to the discovery of on-going mutation and adaptation of in-between states of resistance.  ...  The project finds that both legal and technical mechanisms for restricting the flow of content can be countervailed, which in turn leads to the development of different control mechanisms and in turn engenders  ...  public key 629 .  ... 
doi:10.25602/gold.00016589 fatcat:3szv2ve46jb3blsoaalxp5rk7m

'My mind on paper': Anne Lister and literary self-construction in early-nineteenth-century Halifax

Anira Rowanchild
2000
It explores her relationship to contemporary ideas of authorship and to notions of public and private, and investigates the impact of reading in the autobiographical writing of Lister and her circle and  ...  the significance of the cipher in her social and sexual self-representation.  ...  Acknowledgements My thanks go to the following people for their interest, help, advice, support and  ... 
doi:10.21954/ou.ro.0000e28e fatcat:4cyyqgz7yraexeadb6glmcaq34

Singularities: technoculture, transhumanism, and science fiction in the 21st Century SINGULARITIES: TECHNOCULTURE, TRANSHUMANISM, AND SCIENCE FICTION IN THE 21 ST CENTURY

Joshua Raulerson, Joshua Raulerson, Charles Stross, Cory Doctorow, Neal Stephenson, Bruce Sterling, Rudy Rucker, William Gibson, Joshua Raulerson
2010 unpublished
, demanding both a reevaluation of SF's conception of and orientation toward the future, and a new narrative model capable of grappling with the alien and often paradoxical complexity of the postsingular  ...  around the premises of Singularity and the posthuman, and classifiable primarily in terms of an attempt to mount a response to the formal and conceptual problems Vinge has identified.  ...  strategies of resistance and liberation.  ... 
fatcat:qmpgwpi74jdfhipo4bt7o2wy3q

P R O C E E D I N G S STRATEGIES XXI THE COMPLEX AND DYNAMIC NATURE OF THE SECURITY ENVIRONMENT Volume 2

Stan Anton, Alexandra Sarcinschi, Gabriel-Florin Moisescu, Gheorghe Calopăreanu, Mihai Zodian, Stan Anton, Irina Tătaru, Daniela Răpan
unpublished
Public opinion is a social key indicator of Foreign Policy that is influencing the way in which the leaders are responding to the reaction of the population.  ...  conditions, and standards articulated in the unit's standards document(s).  ...  Another distinctive element is the need for cooperation between the public and the private sector so as to face such threats bearing in mind that intelligence services and the army have always been the  ... 
fatcat:iz6xfpfg2rarnpoeieqszlunou

The Spirit-Lyre and the Broken Radio: The Medium as Poet From Sprague to Spicer [article]

(:Unkn) Unknown, University, My, Katherine Henry
2021
In doing so I hope to illuminate the recurring esoteric streak running from high modernism to, in fits and spurts, the present.  ...  Spicer, before arriving in the conclusion at the 21st century and its fresh proliferation of esoterically inclined medium-poets.  ...  Spicer points to Georgie Hyde-Lees, the wife of Yeats and the medium through whom A Vision was directed and a key figure in Yeats' own model of inspired or received texts, as the first "modern" practitioner  ... 
doi:10.34944/dspace/6563 fatcat:lxjm55y5wzhxzbcmvlftn47puy