Sciweavers

397 search results - page 73 / 80
» Pseudorandom Functions and Lattices
Sort
View
78
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 9 months ago
Connectivity in Sub-Poisson Networks
: We consider a class of point processes, which we call sub-Poisson; these are point processes that can be directionallyconvexly (dcx) dominated by some Poisson point process. The ...
Bartlomiej Blaszczyszyn, D. Yogeshwaran
MMAS
2010
Springer
14 years 4 months ago
Sharp Stability Estimates for the Force-Based Quasicontinuum Approximation of Homogeneous Tensile Deformation
The accuracy of atomistic-to-continuum hybrid methods can be guaranteed only for deformations where the lattice configuration is stable for both the atomistic energy and the hybrid...
Matthew Dobson, Mitchell Luskin, Christoph Ortner
ICS
2010
Tsinghua U.
15 years 6 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 3 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
SASN
2005
ACM
15 years 3 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu