Sciweavers

3373 search results - page 412 / 675
» Linear transformations on codes
Sort
View
132
Voted
AES
2004
Springer
139views Cryptology» more  AES 2004»
15 years 9 months ago
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
This paper is motivated by the design of AES. We consider a broader question of cryptanalysis of block ciphers having very good non-linearity and diffusion. Can we expect anyway, ...
Nicolas Courtois
DATE
2002
IEEE
79views Hardware» more  DATE 2002»
15 years 8 months ago
Formulation of Low-Order Dominant Poles for Y-Matrix of Interconnects
This paper presents an efficient approach to compute the dominant poles for the reduced-order admittance (Y parameter) matrix of lossy interconnects. Using the global approximati...
Qinwei Xu, Pinaki Mazumder
136
Voted
ASIACRYPT
2009
Springer
15 years 7 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
160
Voted
PODS
1991
ACM
131views Database» more  PODS 1991»
15 years 7 months ago
Termination Detection in Logic Programs using Argument Sizes
d Abstract Kirack Sohn and Allen Van Gelder University of California, Santa Cruz Progress on automated termination detection for logic programs is reported. The prospects for han...
Kirack Sohn, Allen Van Gelder
152
Voted
NIPS
2008
15 years 5 months ago
Nonrigid Structure from Motion in Trajectory Space
Existing approaches to nonrigid structure from motion assume that the instantaneous 3D shape of a deforming object is a linear combination of basis shapes, which have to be estima...
Ijaz Akhter, Yaser Sheikh, Sohaib Khan, Takeo Kana...