Sciweavers

JCT
2011
93views more  JCT 2011»
12 years 7 months ago
A graph-theoretic approach to quasigroup cycle numbers
Abstract. Norton and Stein associated a number with each idempotent quasigroup or diagonalized Latin square of given finite order n, showing that it is congruent mod 2 to the tria...
Brent Kerby, Jonathan D. H. Smith
TCOM
2008
151views more  TCOM 2008»
13 years 3 months ago
Design of regular (2, dc)-LDPC codes over GF(q) using their binary images
In this paper, a method to design regular (2, dc)-LDPC codes over GF(q) with both good waterfall and error floor properties is presented, based on the algebraic properties of thei...
Charly Poulliat, Marc P. C. Fossorier, David Decle...
ORDER
2006
128views more  ORDER 2006»
13 years 4 months ago
Algebras Defined from Ordered Sets and the Varieties they Generate
We investigate ways of representing ordered sets as algebras and how the order relation is reflected in the algebraic properties of the variety (equational class) generated by the...
Joel Berman, Willem J. Blok
DM
2008
79views more  DM 2008»
13 years 5 months ago
The reconstruction conjecture and edge ideals
Given a simple graph G on n vertices, we prove that it is possible to reconstruct several algebraic properties of the edge ideal from the deck of G, that is, from the collection o...
Kia Dalili, Sara Faridi, Will Traves
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 5 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
EUSFLAT
2003
119views Fuzzy Logic» more  EUSFLAT 2003»
13 years 6 months ago
On some properties of intuitionistic fuzzy implications
We discuss the algebraic properties of intuitionistic fuzzy implications. We examine the conjugacy problem in this family of functions. The characterizations of intuitionistic fuz...
Michal Baczynski
CSFW
2009
IEEE
13 years 8 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
ICALP
2010
Springer
13 years 9 months ago
On Bisimilarity and Substitution in Presence of Replication
Abstract. We prove a new congruence result for the π-calculus: bisimilarity is a congruence in the sub-calculus that does not include restriction nor sum, and features top-level r...
Daniel Hirschkoff, Damien Pous
LPAR
2005
Springer
13 years 10 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
WISTP
2009
Springer
13 years 11 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic