Sciweavers

1274 search results - page 69 / 255
» New Proofs for
Sort
View
RSA
2000
112views more  RSA 2000»
15 years 12 days ago
Growth of components in random graphs
The creation and growth of components of a given complexity in a random graph process are studied. In particular, the expected number and total size of all such components is found...
Svante Janson
89
Voted
DM
1998
56views more  DM 1998»
15 years 10 days ago
Factoring cardinal product graphs in polynomial time
In this paper a polynomial algorithm for the prime factorization of finite, connected nonbipartite graphs with respect to the cardinal product is presented. This algorithm also d...
Wilfried Imrich
JCT
2010
80views more  JCT 2010»
14 years 11 months ago
Shadows and intersections in vector spaces
We prove a vector space analog of a version of the Kruskal-Katona theorem due to Lov´asz. We apply this result to extend Frankl’s theorem on r-wise intersecting families to vec...
Ameera Chowdhury, Balázs Patkós
199
Voted
POPL
2006
ACM
16 years 29 days ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
82
Voted
CRYPTO
2007
Springer
104views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Converse...
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q....