Sciweavers

1401 search results - page 119 / 281
» Randomness in Interactive Proofs
Sort
View
ASIACRYPT
2006
Springer
15 years 7 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
126
Voted
SODA
2008
ACM
112views Algorithms» more  SODA 2008»
15 years 4 months ago
The effect of induced subgraphs on quasi-randomness
One of the main questions that arise when studying random and quasi-random structures is which properties P are such that any object that satisfies P "behaves" like a tr...
Asaf Shapira, Raphael Yuster
125
Voted
PE
2008
Springer
108views Optimization» more  PE 2008»
15 years 3 months ago
Rate-optimal schemes for Peer-to-Peer live streaming
In this paper we consider the problem of sending data in real time from information sources to sets of receivers, using peer-to-peer communications. We consider several models of ...
Laurent Massoulié, Andrew Twigg
177
Voted
MA
2011
Springer
246views Communications» more  MA 2011»
14 years 10 months ago
On the Gaussian approximation of vector-valued multiple integrals
: By combining the findings of two recent, seminal papers by Nualart, Peccati and Tudor, we get that the convergence in law of any sequence of vector-valued multiple integrals Fn ...
Salim Noreddine, Ivan Nourdin