Sciweavers

CAGD
2010
116views more  CAGD 2010»
13 years 4 months ago
On rational Minkowski Pythagorean hodograph curves
Minkowski Pythagorean hodograph curves are polynomial curves with polynomial speed, measured with respect to Minkowski norm. Curves of this special class are particularly well sui...
Jirí Kosinka, Miroslav Lávicka
AAECC
2007
Springer
127views Algorithms» more  AAECC 2007»
13 years 4 months ago
Skew-cyclic codes
We generalize the notion of cyclic codes by using generator polynomials in (non commutative) skew polynomial rings. Since skew polynomial rings are left and right euclidean, the o...
Delphine Boucher, Willi Geiselmann, Felix Ulmer
AAAI
1996
13 years 5 months ago
On the Size of Reactive Plans
One of the most widespread approaches to reactive planning is Schoppers' universal plans. We propose a stricter definition of universal plans which guarantees a weak notion o...
Peter Jonsson, Christer Bäckström
ICISC
2000
126views Cryptology» more  ICISC 2000»
13 years 5 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
STOC
1991
ACM
84views Algorithms» more  STOC 1991»
13 years 7 months ago
Self-Testing/Correcting for Polynomials and for Approximate Functions
The study of self-testing/correcting programs was introduced in [8] in order to allow one to use program P to compute function f without trusting that P works correctly. A self-te...
Peter Gemmell, Richard J. Lipton, Ronitt Rubinfeld...
FOCS
1992
IEEE
13 years 7 months ago
Reconstructing Algebraic Functions from Mixed Data
We consider a variant of the traditional task of explicitly reconstructing algebraic functions from black box representations. In the traditional setting for such problems, one is ...
Sigal Ar, Richard J. Lipton, Ronitt Rubinfeld, Mad...
PKC
2000
Springer
118views Cryptology» more  PKC 2000»
13 years 7 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
13 years 8 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong
FPL
2006
Springer
223views Hardware» more  FPL 2006»
13 years 8 months ago
From Equation to VHDL: Using Rewriting Logic for Automated Function Generation
This paper presents a novel tool flow combining rewriting logic with hardware synthesis. It enables the automated generation of synthesizable VHDL code from mathematical equations...
Carlos Morra, M. Sackmann, Sunil Shukla, Jürg...
CSR
2006
Springer
13 years 8 months ago
Complexity of Polynomial Multiplication over Finite Fields
Let Mq (n ) denote the number of multiplications required to compute the coefficients of the product of two polynomials of degree n over a q -element field by means of bilinear alg...
Michael Kaminski