Sciweavers

1696 search results - page 12 / 340
» Permuted function matching
Sort
View
DCC
2011
IEEE
14 years 1 months ago
Notions and relations for RKA-secure permutation and function families
Jongsung Kim, Jaechul Sung, Ermaliza Razali, Rapha...
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 4 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 5 months ago
Digraph description of k-interchange technique for optimization over permutations and adaptive algorithm system
The paper describes a general glance to the use of element exchange techniques for optimization over permutations. A multi-level description of problems is proposed which is a fund...
Mark Sh. Levin
COCO
2004
Springer
118views Algorithms» more  COCO 2004»
15 years 3 months ago
Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go?
In decision tree models, considerable attention has been paid on the effect of symmetry on computational complexity. That is, for a permutation group Γ, how low can the complexit...
Xiaoming Sun, Andrew Chi-Chih Yao, Shengyu Zhang