Sciweavers

131 search results - page 17 / 27
» Adversary lower bounds for nonadaptive quantum algorithms
Sort
View
ASIACRYPT
2009
Springer
15 years 6 months ago
Security Bounds for the Design of Code-Based Cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Matthieu Finiasz, Nicolas Sendrier
ESA
2005
Springer
99views Algorithms» more  ESA 2005»
15 years 5 months ago
Optimizing a 2D Function Satisfying Unimodality Properties
The number of probes needed by the best possible algorithm for locally or globally optimizing a bivariate function varies substantially depending on the assumptions made about the ...
Erik D. Demaine, Stefan Langerman
98
Voted
ICALP
2003
Springer
15 years 4 months ago
Anycasting in Adversarial Systems: Routing and Admission Control
Abstract. In this paper we consider the problem of routing packets in dynamically changing networks, using the anycast mode. In anycasting, a packet may have a set of destinations ...
Baruch Awerbuch, André Brinkmann, Christian...
STOC
2007
ACM
136views Algorithms» more  STOC 2007»
15 years 12 months ago
Exponential separations for one-way quantum communication complexity, with applications to cryptography
We give an exponential separation between one-way quantum and classical communication protocols for two partial Boolean functions, both of which are variants of the Boolean Hidden...
Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, ...
CPC
2007
97views more  CPC 2007»
14 years 11 months ago
On an Online Spanning Tree Problem in Randomly Weighted Graphs
Abstract. This paper is devoted to an online variant of the minimum spanning tree problem in randomly weighted graphs. We assume that the input graph is complete and the edge weigh...
Jan Remy, Alexander Souza, Angelika Steger