Sciweavers

502 search results - page 43 / 101
» Deploying a New Hash Algorithm
Sort
View
87
Voted
ASIACRYPT
2003
Springer
15 years 5 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
VLDB
1992
ACM
140views Database» more  VLDB 1992»
15 years 3 months ago
Practical Skew Handling in Parallel Joins
We present an approach to dealing with skew in parallel joins in database systems. Our approach is easily implementable within current parallel DBMS, and performs well on skewed d...
David J. DeWitt, Jeffrey F. Naughton, Donovan A. S...
ECCC
2007
123views more  ECCC 2007»
14 years 11 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters
INFOCOM
2009
IEEE
15 years 6 months ago
Surface Coverage in Wireless Sensor Networks
—Coverage is a fundamental problem in Wireless Sensor Networks (WSNs). Existing studies on this topic focus on 2D ideal plane coverage and 3D full space coverage. In many real wo...
Ming-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Li...
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 12 months ago
Pairwise Optimal Discrete Coverage Control for Gossiping Robots
Abstract-- We propose distributed algorithms to automatically deploy a group of robotic agents and provide coverage of a discretized environment represented by a graph. The classic...
Joseph W. Durham, Ruggero Carli, Francesco Bullo