Sciweavers

UMC
2000
15 years 7 months ago
Inaccessibility in Decision Procedures
Asaki Saiton, Kunihiko Kaneko
UMC
2000
15 years 7 months ago
Upper and Lower Bounds on Continuous-Time Computation
Abstract. We consider various extensions and modifications of Shannon's General Purpose Analog Computer, which is a model of computation by differential equations in continuou...
Manuel Lameiras Campagnolo, Cristopher Moore
UIST
2000
ACM
15 years 7 months ago
ToolStone: effective use of the physical manipulation vocabularies of input devices
The ToolStone is a cordless, multiple degree-of-freedom (MDOF) input device that senses physical manipulation of itself, such as rotating, flipping, or tilting. As an input device...
Jun Rekimoto, Eduardo Sciammarella
CRYPTO
1995
Springer
111views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Fast Key Exchange with Elliptic Curve Systems
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field F2n. A software version of this using n = 155 can be o...
Richard Schroeppel, Hilarie K. Orman, Sean W. O'Ma...
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway