Sciweavers

345 search results - page 34 / 69
» Computer-Assisted Simulation Proofs
Sort
View
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
14 years 6 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
IJISEC
2007
61views more  IJISEC 2007»
15 years 2 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
DAC
1999
ACM
16 years 3 months ago
LISA - Machine Description Language for Cycle-Accurate Models of Programmable DSP Architectures
Abstract { This paper presents the machine description language LISA for the generation of bitand cycle accurate models of DSP processors. Based on a behavioral operation descripti...
Stefan Pees, Andreas Hoffmann, Vojin Zivojnovic, H...
137
Voted
MICCAI
2004
Springer
16 years 3 months ago
Multi-channel Mutual Information Using Scale Space
We propose a new voxel similarity measure which utilises local image structure as well intensity information. Gaussian scale space derivatives are used to provide the structural in...
Mark Holden, Lewis D. Griffin, Nadeem Saeed, Derek...
ICCAD
2007
IEEE
67views Hardware» more  ICCAD 2007»
15 years 11 months ago
Stabilizing schemes for piecewise-linear reduced order models via projection and weighting functions
— In this paper we present several results concerning the stabilization of piecewise-linear reduced order models. We include proofs of internal and external stability for models ...
Bradley N. Bond, Luca Daniel