Sciweavers

893 search results - page 72 / 179
» Descent Theory for Schemes
Sort
View
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
15 years 4 months ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov
ICDCS
1997
IEEE
15 years 4 months ago
Two New Quorum Based Algorithms for Distributed Mutual Exclusion
Two novel suboptimal algorithms for mutual exclusion in distributed systems are presented. One is based on the modi cation of Maekawa's grid based quorum scheme. The size of ...
Wai-Shing Luk, Tien-Tsin Wong
ICIP
1994
IEEE
15 years 4 months ago
Analyzing and Synthesizing Images by Evolving Curves
Abstract. Numerical analysis of conservation laws plays an important role in the implementation of curve evolution equations. This paper reviews the relevant concepts in numerical ...
Alfred M. Bruckstein
VISUALIZATION
1994
IEEE
15 years 4 months ago
An Evaluation of Reconstruction Filters for Volume Rendering
To render images from a three-dimensional array of sample values, it is necessary to interpolate between the samples. This paper is concerned with interpolation methods that are e...
Stephen R. Marschner, Richard Lobb
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern