Sciweavers

81 search results - page 6 / 17
» Pseudorandom Financial Derivatives
Sort
View
ICISS
2009
Springer
14 years 7 months ago
On Some Weaknesses in the Disk Encryption Schemes EME and EME2
Abstract. Tweakable enciphering schemes are a certain type of blockcipher mode of operation which provide security in the sense of a strong pseudo-random permutation. It has been p...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
IH
2004
Springer
15 years 3 months ago
On the Possibility of Non-invertible Watermarking Schemes
Recently, there are active discussions on the possibility of non-invertible watermarking scheme. A non-invertible scheme prevents an attacker from deriving a valid watermark from a...
Qiming Li, Ee-Chien Chang
ENGL
2008
186views more  ENGL 2008»
14 years 10 months ago
High Performance Monte-Carlo Based Option Pricing on FPGAs
High performance computing is becoming increasingly important in the field of financial computing, as the complexity of financial models continues to increase. Many of these financ...
Xiang Tian, Khaled Benkrid, Xiaochen Gu
78
Voted
ICNP
2006
IEEE
15 years 4 months ago
O-MAC: A Receiver Centric Power Management Protocol
— Energy efficiency is widely understood to be one of the dominant considerations for Wireless Sensor Networks. Based on historical data and technology trends, the receiver ener...
Hui Cao, Ken Parker, Anish Arora
CCS
2008
ACM
15 years 2 days ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...