Sciweavers

397 search results - page 28 / 80
» Pseudorandom Functions and Lattices
Sort
View
EUROCRYPT
2010
Springer
15 years 6 months ago
Universal One-Way Hash Functions via Inaccessible Entropy
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, whi...
Iftach Haitner, Thomas Holenstein, Omer Reingold, ...
ICIP
2002
IEEE
16 years 2 months ago
Image resampling between orthogonal and hexagonal lattices
Resampling techniques are commonly required in digital image processing systems. Many times the classical interpolation functions are used, i.e., nearest-neighbour interpolation a...
Dimitri Van De Ville, Rik Van de Walle, Wilfried P...
CCS
2008
ACM
15 years 3 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
COMBINATORICA
2011
14 years 1 months ago
A q-analogue of the FKG inequality and some applications
Let L be a finite distributive lattice and µ : L → R+ a logsupermodular function. For functions k : L → R+ let Eµ(k; q) def = x∈L k(x)µ(x)qrank(x) ∈ R+ [q]. We prove fo...
Anders Björner
DKE
2002
218views more  DKE 2002»
15 years 1 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...