Sciweavers

13214 search results - page 17 / 2643
» Pseudorandomness for network algorithms
Sort
View
ICCD
1993
IEEE
90views Hardware» more  ICCD 1993»
15 years 3 months ago
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip
In this paper the design of a high-speed cryptographic coprocessor is presented. This coprocessor is named Subterranean and can be used for both cryptographic pseudorandom sequenc...
Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Pee...
80
Voted
STOC
2010
ACM
216views Algorithms» more  STOC 2010»
15 years 9 months ago
BQP and the Polynomial Hierarchy
The relationship between BQP and PH has been an open problem since the earliest days of quantum computing. We present evidence that quantum computers can solve problems outside th...
Scott Aaronson
EUROSYS
2006
ACM
15 years 3 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
EUROCRYPT
2009
Springer
16 years 8 days ago
Order-Preserving Symmetric Encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowin...
Alexandra Boldyreva, Nathan Chenette, Younho Lee, ...
CEC
2008
IEEE
15 years 6 months ago
Generating massive high-quality random numbers using GPU
— Pseudo-random number generators (PRNG) have been intensively used in many stochastic algorithms in artificial intelligence, computer graphics and other scientific computing. ...
Wai-Man Pang, Tien-Tsin Wong, Pheng-Ann Heng