Sciweavers

891 search results - page 158 / 179
» Full Abstraction for PCF
Sort
View
EUROCRYPT
2003
Springer
15 years 5 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
HYBRID
2003
Springer
15 years 5 months ago
Mode Reconstruction for Source Coding and Multi-modal Control
s of Invited Presentations The Mathematics of Matter and the Mathematics of Mind . . . . . . . . . . . . . 1 David Berlinski A Grand Challenge: Full Reactive Modeling of a Multi-ce...
Adam Austin, Magnus Egerstedt
ICALP
2003
Springer
15 years 5 months ago
Similarity Matrices for Pairs of Graphs
Abstract. We introduce a concept of similarity between vertices of directed graphs. Let GA and GB be two directed graphs with respectively nA and nB vertices. We define a nA × nB...
Vincent D. Blondel, Paul Van Dooren
ICDT
2003
ACM
202views Database» more  ICDT 2003»
15 years 5 months ago
Condensed Representation of Database Repairs for Consistent Query Answering
Abstract. Repairing a database means bringing the database in accordance with a given set of integrity constraints by applying modifications that are as small as possible. In the ...
Jef Wijsen
AFRICACRYPT
2010
Springer
15 years 4 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...