Sciweavers

9886 search results - page 411 / 1978
» Learning Compressible Models
Sort
View
142
Voted
INDOCRYPT
2005
Springer
15 years 10 months ago
Towards Optimal Double-Length Hash Functions
In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
Mridul Nandi
WACV
2002
IEEE
15 years 9 months ago
Retrieving Faces by the PIFS Fractal Code
The use of fractals in computer graphics and vision in modeling unstructured images, and compressing images, is well known. However, the use of fractals for indexing images in con...
Sharat Chandran, Soumitra Kar
129
Voted
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
15 years 9 months ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks
DAC
1997
ACM
15 years 9 months ago
A Power Estimation Framework for Designing Low Power Portable Video Applications
This paper presents a power evaluation framework designed for estimating power consumption of a new video telephone compression standard, ITU-H.263, at the system level. A hierarc...
Chi-Ying Tsui, Kai-Keung Chan, Qing Wu, Chih-Shun ...
APPROX
2004
Springer
89views Algorithms» more  APPROX 2004»
15 years 8 months ago
The Sketching Complexity of Pattern Matching
Abstract. We address the problems of pattern matching and approximate pattern matching in the sketching model. We show that it is impossible to compress the text into a small sketc...
Ziv Bar-Yossef, T. S. Jayram, Robert Krauthgamer, ...