Sciweavers

526 search results - page 26 / 106
» On circularly symmetric functions
Sort
View
DCC
2007
IEEE
15 years 11 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
VMV
2008
129views Visualization» more  VMV 2008»
15 years 1 months ago
Shape Median Based on Symmetric Area Differences
Median averaging is a powerful averaging concept on sets of vector data in finite dimensions. A generalization of the median for shapes in the plane is introduced. The underlying ...
Benjamin Berkels, Gina Linkmann, Martin Rumpf
OL
2008
54views more  OL 2008»
14 years 11 months ago
On hyperbolicity cones associated with elementary symmetric polynomials
Elementary symmetric polynomials can be thought of as derivative polynomials of En(x) = i=1,...,n xi. Their associated hyperbolicity cones give a natural sequence of relaxations f...
Yuriy Zinchenko
ANTS
2006
Springer
75views Algorithms» more  ANTS 2006»
15 years 1 months ago
Symmetric Powers of Elliptic Curve L-Functions
Abstract. The conjectures of Deligne, Beilinson, and Bloch-Kato assert that there should be relations between the arithmetic of algebrogeometric objects and the special values of t...
Phil Martin, Mark Watkins
ECCC
2011
187views ECommerce» more  ECCC 2011»
14 years 3 months ago
In Brute-Force Search of Correlation Bounds for Polynomials
We report on some initial results of a brute-force search for determining the maximum correlation between degree-d polynomials modulo p and the n-bit mod q function. For various s...
Frederic Green, Daniel Kreymer, Emanuele Viola