Sciweavers

45 search results - page 7 / 9
» Cryptography in Quadratic Function Fields
Sort
View
DM
2008
101views more  DM 2008»
13 years 6 months ago
Congruences involving Bernoulli polynomials
Let {Bn(x)} be the Bernoulli polynomials. In the paper we establish some congruences for Bj(x) (mod pn), where p is an odd prime and x is a rational p-integer. Such congruences are...
Zhi-Hong Sun
EUROCRYPT
2003
Springer
13 years 11 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
ICCV
2009
IEEE
14 years 11 months ago
Large Displacement Optical Flow Computation without Warping
We propose an algorithm for large displacement opti- cal flow estimation which does not require the commonly used coarse-to-fine warping strategy. It is based on a quadratic rel...
Frank Steinbrucker, Thomas Pock, Daniel Cremers
ICIP
2007
IEEE
14 years 8 months ago
Enabling Better Medical Image Classification Through Secure Collaboration
Privacy is of growing concern in today's day and age. Protecting the privacy of health data is of paramount importance. With the rapid advancement in imaging technology, anal...
Jaideep Vaidya, Bhakti Tulpule
CVPR
2007
IEEE
14 years 8 months ago
Constrained Optimization for Retinal Curvature Estimation Using an Affine Camera
We study retinal curvature estimation from multiple images that provides the fundamental geometry of human retina. We use an affine camera model due to its simplicity, linearity, ...
Thitiporn Chanwimaluang, Guoliang Fan