A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
[chapter]
2015
Lecture Notes in Computer Science
Forms of PKE resisting these have in fact already been defined, namely deterministic public-key encryption (D-PKE) [4] and hedged public-key encryption (H-PKE) [5] . ...
This paper provides the first efficient, standard-model, fully-secure schemes for some related and challenging forms of public-key encryption (PKE), namely deterministic and hedged PKE. ...
Part of the work was done when Hoang was working at UCSD, supported in part by NSF grants CNS-1116800 and CNS-1228890. ...
doi:10.1007/978-3-662-46803-6_21
fatcat:22ld7gamxzhbnicgdfbi37c244
Hedging Public-Key Encryption in the Real World
[chapter]
2017
Lecture Notes in Computer Science
We also propose a new security notion, MM-CCA, which generalizes traditional IND-CCA to admit imperfect randomness. Like IND-CCA, and unlike IND-CDA, our notion gives the adversary the public key. ...
The idea actually goes back to the Fujisaki-Okamoto transform for turning CPA-secure encryption into CCA-secure encryption, and is also used to build deterministic PKE schemes. ...
We also thank Mihir Bellare and the anonymous reviewers for valuable feedback, as well as Joseph Choi and Animesh Chhotaray for bug fixes. ...
doi:10.1007/978-3-319-63697-9_16
fatcat:xphbmdkgbrh2hjpiejndsfwf7i
Public-Seed Pseudorandom Permutations
[chapter]
2017
Lecture Notes in Computer Science
This paper initiates the study of standard-model assumptions on permutations -or more precisely, on families of permutations indexed by a public seed. ...
., making it random and accessible, as an oracle, to all parties. ...
Acknowledgments We wish to thank John Retterer-Moore for his involvement in an earlier stage of this project. We also thank the EUROCRYPT '17 anonymous reviewers for their insightful feedback. ...
doi:10.1007/978-3-319-56614-6_14
fatcat:2d7xhdjlnfedzcsdq22pcqyt24
Peripheral state persistence for transiently-powered systems
2017
2017 Global Internet of Things Summit (GIoTS)
The rsa64 test case uses iterative left-to-right modular exponentiation of multipleprecision integers to encrypt a 64-bit message under a 64-bit public key and 17bit exponent. ...
The IMD then generates a random value to be used as a session key and broadcasts it as a modulated sound wave. ...
doi:10.1109/giots.2017.8016243
dblp:conf/giots/BerthouDMRS17
fatcat:r2vbvtjlnvdlxkkt6ldrw43l6m
The cathedral and the bazaar
1999
Knowledge, Technology and Policy
Glen Vandenburg <glv@vanderburg.org> pointeed out the importance of self-selection in contributor populations and suggested the fruitful idea that much development rectifies 'bugs of omission'; Daniel ...
Particular thanks to Jeff Dutky <dutky@wam.umd.edu>, who suggested the "debugging is parallelizable" formulation, and helped develop the analysis that proceeds from it. ...
The Cathedral and the Bazaar Linux is subversive. ...
doi:10.1007/s12130-999-1026-0
fatcat:6oo3faw4ffhgbko2xcgvuai4f4
The Democratization of Artificial Intelligence
[chapter]
2019
The Democratization of Artificial Intelligence
BBC (http:// www.bbc.com/capital/story/20190307-the-hidden-armies-that-power-the-in ternets-new-stars) [Last access 24.4.2019]. ...
Tsing, Anna (2015): A Feminist Approach to the Anthropocene: Earth Stalked by Man. Lecture held at the Barnard College for Women. (https://www.youtube. com/watch? ...
Acknowledgments This volume is the first publication of a newly founded book series entitled "AI Critique". ...
doi:10.1515/9783839447192-001
fatcat:7yjb2m5p7jdt7dvkpzsuttbvf4
Corruption and Financial Crime
2018
Figshare
Essays about corruption, money laundering, crime, and international finance. ...
The Macedonian Police in that period was not in control of the whole territory of the country, especially the western part of Macedonia, which was predominantly ...
Therefore, the question of mutual monitoring and control is a key issue in collusive oligopolies." ...
doi:10.6084/m9.figshare.7176539
fatcat:pjcdb2c32vh4fp2rlzx3p6qoke
Chapter 16. Intellectual, Argumentative, and Informational Affordances of Public Forums: Potential Contributions to Academic Learning
[chapter]
2017
Social Writing/Social Media: Publics, Presentations, and Pedagogies
Printed in the United States of America Library of Congress Cataloging-in-Publication Data Names: Walls, Douglas M., 1973-editor. | Vie, Stephanie, editor. ...
Title: Social writing/social media : publics, presentations, and pedagogies / edited by Douglas M. Walls and Stephanie Vie. ...
Walls, Stephanie Vie, Beth Allison Barr, and Theresa Kennedy for their insightful feedback. Finally, we express appreciation to Shane Alexander and Scott Varda for their steadfast love and support. ...
doi:10.37514/per-b.2017.0063.2.16
fatcat:2shjxaektbcxdnwjznivwxb4wq
Disrupting surveillance: critical software design-led practice to obfuscate and reveal surveillance economies and knowledge monopolies
[article]
2021
This thesis investigates the taken for granted ways our interactions with surveillance capitalism infrastructures are transforming our individual and collective beings and in turn the new cyborg ontologies ...
The four critical design works included in this investigation offer alternative possibilities for critical engagement with, and interpretation of, [...] ...
Moreover, in the broader sense one of the key components of critical design is obfuscation and subversion of dominant power/knowledge regimes. ...
doi:10.7488/era/1188
fatcat:dqzfuxychfafdabx4yhz3c5ioe
good and real Demystifying Paradoxes from Physics to Ethics Good and Real Good and Real Demystifying Paradoxes from Physics to Ethics
unpublished
No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the ...
To decrypt the encrypted message, we must know the key that was used to encrypt it. ...
In the cipher, we encrypt a message by providing a key-just some series of numbers-and aligning each next letter in the message with each next number in the key. ...
fatcat:hr6g6srxjnhl5pdbpmfxlzo3xq
Strategies for Unbridled Data Dissemination: An Emergency Operations Manual
2015
The undertaken methodological approach thus leads to the discovery of on-going mutation and adaptation of in-between states of resistance. ...
The project finds that both legal and technical mechanisms for restricting the flow of content can be countervailed, which in turn leads to the development of different control mechanisms and in turn engenders ...
public key 629 . ...
doi:10.25602/gold.00016589
fatcat:3szv2ve46jb3blsoaalxp5rk7m
'My mind on paper': Anne Lister and literary self-construction in early-nineteenth-century Halifax
2000
It explores her relationship to contemporary ideas of authorship and to notions of public and private, and investigates the impact of reading in the autobiographical writing of Lister and her circle and ...
the significance of the cipher in her social and sexual self-representation. ...
Acknowledgements My thanks go to the following people for their interest, help, advice, support and ...
doi:10.21954/ou.ro.0000e28e
fatcat:4cyyqgz7yraexeadb6glmcaq34
Singularities: technoculture, transhumanism, and science fiction in the 21st Century SINGULARITIES: TECHNOCULTURE, TRANSHUMANISM, AND SCIENCE FICTION IN THE 21 ST CENTURY
2010
unpublished
, demanding both a reevaluation of SF's conception of and orientation toward the future, and a new narrative model capable of grappling with the alien and often paradoxical complexity of the postsingular ...
around the premises of Singularity and the posthuman, and classifiable primarily in terms of an attempt to mount a response to the formal and conceptual problems Vinge has identified. ...
strategies of resistance and liberation. ...
fatcat:qmpgwpi74jdfhipo4bt7o2wy3q
P R O C E E D I N G S STRATEGIES XXI THE COMPLEX AND DYNAMIC NATURE OF THE SECURITY ENVIRONMENT Volume 2
unpublished
Public opinion is a social key indicator of Foreign Policy that is influencing the way in which the leaders are responding to the reaction of the population. ...
conditions, and standards articulated in the unit's standards document(s). ...
Another distinctive element is the need for cooperation between the public and the private sector so as to face such threats bearing in mind that intelligence services and the army have always been the ...
fatcat:iz6xfpfg2rarnpoeieqszlunou
The Spirit-Lyre and the Broken Radio: The Medium as Poet From Sprague to Spicer
[article]
2021
In doing so I hope to illuminate the recurring esoteric streak running from high modernism to, in fits and spurts, the present. ...
Spicer, before arriving in the conclusion at the 21st century and its fresh proliferation of esoterically inclined medium-poets. ...
Spicer points to Georgie Hyde-Lees, the wife of Yeats and the medium through whom A Vision was directed and a key figure in Yeats' own model of inspired or received texts, as the first "modern" practitioner ...
doi:10.34944/dspace/6563
fatcat:lxjm55y5wzhxzbcmvlftn47puy