Sciweavers

1696 search results - page 88 / 340
» Permuted function matching
Sort
View
ICISC
2007
77views Cryptology» more  ICISC 2007»
14 years 11 months ago
Improving Upon the TET Mode of Operation
Naor and Reingold had proposed the construction of a strong pseudo-random permutation (SPRP) by using a layer of ECB encryption between two layers of invertible block-wise universa...
Palash Sarkar
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
14 years 7 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
GECCO
2011
Springer
270views Optimization» more  GECCO 2011»
14 years 1 months ago
Geometric surrogate-based optimisation for permutation-based problems
In continuous optimisation, surrogate models (SMs) are used when tackling real-world problems whose candidate solutions are expensive to evaluate. In previous work, we showed that...
Alberto Moraglio, Yong-Hyuk Kim, Yourim Yoon
JMIV
2007
99views more  JMIV 2007»
14 years 10 months ago
Image Similarity Based on Intensity Scaling
An image similarity measure based upon intensity scaling is investigated for the registration of images which differ in contast. The measure is introduced for both optical flow a...
Stephen L. Keeling
85
Voted
ICPR
2006
IEEE
15 years 11 months ago
Recover Writing Trajectory from Multiple Stroked Image Using Bidirectional Dynamic Search
The recovery of writing trajectory from offline handwritten image is generally regarded as a difficult problem [1]. This paper introduced a method to recover the writing trajector...
Yu Qiao, Makoto Yasuhara