In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
We study the influence of the choice of template in tensorbased morphometry. Using 3D brain MR images from 10 monozygotic twin pairs, we defined a tensor-based distance in the log...
Natasha Lepore, Caroline A. Brun, Yi-Yu Chou, Agat...
We introduce a new dissimilarity function for ranked lists, the expected weighted Hoeffding distance, that has several advantages over current dissimilarity measures for ranked s...
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
This paper considers the problem of performing tasks in asynchronous distributed settings. This problem, called DoAll, has been substantially studied in synchronous models, but th...