Ewha Womans University

Displaying 1-2 of 2 results

  • White Papers // May 2013

    Reducing Pairing Inversion to Exponentiation Inversion using Non-degenerate Auxiliary Pairing

    The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem. Building on previous works, the authors provide further contributions on the difficulty of pairing inversion. In particular, they revisit the approach of Kanayama-Okamoto who modified exponentiation inversion and Miller inversion by considering an "Auxiliary"...

    Provided By Ewha Womans University

  • White Papers // Jun 2012

    Automated Memory Leakage Detection in Android Based Systems

    Since open platforms such as Android vary in device manufacturers and application developers, modifications in software happened in multiple layers. Therefore, every layer including OS, library, framework and application may have defects within. Especially, a memory leakage which increases memory usage and diminish overall system performance is the key issue...

    Provided By Ewha Womans University

  • White Papers // May 2013

    Reducing Pairing Inversion to Exponentiation Inversion using Non-degenerate Auxiliary Pairing

    The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem. Building on previous works, the authors provide further contributions on the difficulty of pairing inversion. In particular, they revisit the approach of Kanayama-Okamoto who modified exponentiation inversion and Miller inversion by considering an "Auxiliary"...

    Provided By Ewha Womans University

  • White Papers // Jun 2012

    Automated Memory Leakage Detection in Android Based Systems

    Since open platforms such as Android vary in device manufacturers and application developers, modifications in software happened in multiple layers. Therefore, every layer including OS, library, framework and application may have defects within. Especially, a memory leakage which increases memory usage and diminish overall system performance is the key issue...

    Provided By Ewha Womans University