Sciweavers

10707 search results - page 2103 / 2142
» Designing executable abstractions
Sort
View
ICISC
1998
110views Cryptology» more  ICISC 1998»
14 years 11 months ago
The nonhomomorphicity of S-boxes
Abstract. In this paper, we introduce the concept of kth-order nonhomomorphicity of mappings or S-boxes as an alternative indicator that forecasts nonlinearity characteristics of a...
Yuliang Zheng, Xian-Mo Zhang
ICISC
2000
126views Cryptology» more  ICISC 2000»
14 years 11 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
WSC
2000
14 years 11 months ago
Dynamic component substitution in web-based simulation
Recent breakthroughs in communication and software engineering has resulted in significant growth of web-based computing. Web-based techniques have been employed for modeling, sim...
Dhananjai Madhava Rao, Philip A. Wilsey
WSC
2000
14 years 11 months ago
An integrated object model for activity network based simulation
This paper describes an object-orientated simulation approach towards an integrated planning of production systems. The main obstacle for an integrated use of simulation over diff...
Gert Zülch, Jörg Fischer, Uwe Jonsson
WSC
1997
14 years 11 months ago
MODSIM III - A Tutorial
This tutorial introduces the MODSIM III language, showing how its simulation "world view" together with its object-oriented architecture and built in graphics contribute...
John Goble
« Prev « First page 2103 / 2142 Last » Next »