203
Voted
ACSC
9 years 8 months ago
2016 IEEE
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
112
Voted
ACSC
9 years 8 months ago
2016 IEEE
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
111
Voted
ACSC
9 years 8 months ago
2016 IEEE
In this paper we present an analysis of the impact of instant feedback and autograding in computer science education,
|