214
click to vote
ACSC
9 years 9 months ago
2016 IEEE
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
117
click to vote
ACSC
9 years 9 months ago
2016 IEEE
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
113
click to vote
ACSC
9 years 9 months ago
2016 IEEE
In this paper we present an analysis of the impact of instant feedback and autograding in computer science education,
|