Sciweavers

4529 search results - page 57 / 906
» Position Based Cryptography
Sort
View
BMCBI
2007
94views more  BMCBI 2007»
15 years 2 months ago
False positive reduction in protein-protein interaction predictions using gene ontology annotations
Background: Many crucial cellular operations such as metabolism, signalling, and regulations are based on protein-protein interactions. However, the lack of robust protein-protein...
Mahmood A. Mahdavi, Yen-Han Lin
JAT
2006
73views more  JAT 2006»
15 years 1 months ago
Factorization of multivariate positive Laurent polynomials
Abstract. Recently M. Dritschel proved that any positive multivariate Laurent polynomial can be factorized into a sum of square magnitudes of polynomials. We first give another pro...
Jeffrey S. Geronimo, Ming-Jun Lai
ENTCS
2008
114views more  ENTCS 2008»
15 years 2 months ago
Term-graph Rewriting in Tom Using Relative Positions
In this paper, we present the implementation in Tom of a de Bruijn indices generalization allowing the representation of term-graphs over an algebraic signature. By adding pattern...
Emilie Balland, Paul Brauner
CHES
2007
Springer
107views Cryptology» more  CHES 2007»
15 years 8 months ago
Secret External Encodings Do Not Prevent Transient Fault Analysis
Contrarily to Kerckhoffs’ principle, many applications of today’s cryptography still adopt the security by obscurity paradigm. Furthermore, in order to rely on its proven or e...
Christophe Clavier
ISDA
2006
IEEE
15 years 8 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu