Sciweavers

152 search results - page 8 / 31
» Equations over Sets of Natural Numbers with Addition Only
Sort
View
FOCS
2004
IEEE
15 years 2 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
JSC
2000
117views more  JSC 2000»
14 years 11 months ago
Goals and Benchmarks for Automated Map Reasoning
Tarski-Givant's map calculus is briefly reviewed, and a plan of research is outlined aimed at investigating applications of this ground equational formalism in the theorem-pr...
Andrea Formisano, Eugenio G. Omodeo, Marco Temperi...
IACR
2011
161views more  IACR 2011»
13 years 10 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
GECCO
2003
Springer
108views Optimization» more  GECCO 2003»
15 years 4 months ago
Implicit Parallelism
This paper assumes a search space of fixed-length strings, where the size of the alphabet can vary from position to position. Structural crossover is mask-based crossover, and thu...
Alden H. Wright, Michael D. Vose, Jonathan E. Rowe
144
Voted
CORR
1999
Springer
222views Education» more  CORR 1999»
14 years 10 months ago
Analysis of approximate nearest neighbor searching with clustered point sets
Abstract. Nearest neighbor searching is a fundamental computational problem. A set of n data points is given in real d-dimensional space, and the problem is to preprocess these poi...
Songrit Maneewongvatana, David M. Mount