Sciweavers

648 search results - page 17 / 130
» Generalized Powering Functions and Their Application to Digi...
Sort
View
BMCBI
2010
127views more  BMCBI 2010»
14 years 9 months ago
Deriving enzymatic and taxonomic signatures of metagenomes from short read data
Background: We propose a method for deriving enzymatic signatures from short read metagenomic data of unknown species. The short read data are converted to six pseudo-peptide cand...
Uri Weingart, Erez Persi, Uri Gophna, David Horn
IH
1999
Springer
15 years 1 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 3 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
CSFW
2009
IEEE
15 years 4 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
ISLPED
2005
ACM
84views Hardware» more  ISLPED 2005»
15 years 3 months ago
Hierarchical power management with application to scheduling
This paper presented a hierarchical power management architecture which aims to facilitate power-awareness in an Energy-Managed Computer (EMC) system with multiple components. The...
Peng Rong, Massoud Pedram