Sciweavers

1763 search results - page 67 / 353
» A Formalization of Polytime Functions
Sort
View
ASIACRYPT
2006
Springer
15 years 1 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
TOPLAS
1998
133views more  TOPLAS 1998»
14 years 9 months ago
A Systematic Study of Functional Language Implementations
Abstract: We introduce a unified framework to describe, relate, compare and classify functional language implementations. The compilation process is expressed as a succession of p...
Rémi Douence, Pascal Fradet
JMLR
2010
136views more  JMLR 2010»
14 years 4 months ago
Predicting the functions of proteins in Protein-Protein Interaction networks from global information
In this work we present a novel approach to predict the function of proteins in protein-protein interaction (PPI) networks. We classify existing approaches into inductive and tran...
Hossein Rahmani, Hendrik Blockeel, Andreas Bender
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 1 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
CSB
2005
IEEE
139views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Predicting gene function by combining expression and interaction data
In this study we combined the spurious protein interaction data from the Database of Interacting Proteins with the recently published gene expression data of S. cerevisiae grown w...
Rogier J. P. van Berlo, Lodewyk F. A. Wessels, S. ...