257
Voted
ACSC
10 years 3 days ago
2016 IEEE
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
147
Voted
ACSC
10 years 3 days ago
2016 IEEE
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
139
Voted
ACSC
10 years 3 days ago
2016 IEEE
In this paper we present an analysis of the impact of instant feedback and autograding in computer science education,
|