Sciweavers

340 search results - page 32 / 68
» Cryptography: An Art and Science
Sort
View
WWW
2006
ACM
16 years 15 days ago
The impact of online music services on the demand for stars in the music industry
The music industry's business model is to produce stars. In order to do so, musicians producing music that fits into well defined clusters of factors explaining the demand of...
Ian Pascal Volz
IGARSS
2010
14 years 6 months ago
Hands-on GPS and remote sensing training for high school learners during IGARSS 2009 in Cape Town, South Africa
Continuing the commitment of the Geoscience and Remote Sensing Society (GRSS) to education and outreach, the IEEE 2009 International Geoscience and Remote Sensing Symposium (IGARSS...
Linda Hayden, Ambrose Jearld, Je'aime Powell, Kuch...
ACMSE
2006
ACM
15 years 3 months ago
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform
We introduce an efficient way of performing polynomial multiplication in a class of finite fields GF(pm ) in the frequency domain. The Fast Fourier Transform (FFT) based frequency...
Selçuk Baktir, Berk Sunar
EUROCRYPT
2005
Springer
15 years 5 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
FOCS
1999
IEEE
15 years 4 months ago
Limits on the Efficiency of One-Way Permutation-Based Hash Functions
Naor and Yung show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build...
Jeong Han Kim, Daniel R. Simon, Prasad Tetali