Sciweavers

5722 search results - page 455 / 1145
» Security Function Interactions
Sort
View
EUROCRYPT
2001
Springer
15 years 9 months ago
Cryptanalysis of Reduced-Round MISTY
Abstract. The block ciphers MISTY1 and MISTY2 proposed by Matsui are based on the principle of provable security against differential and linear cryptanalysis. This paper presents...
Ulrich Kühn
AMC
2005
188views more  AMC 2005»
15 years 4 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
CSSC
2010
121views more  CSSC 2010»
15 years 2 months ago
An Efficient Estimation for Switching Regression Models: A Monte Carlo Study
This paper investigates an efficient estimation method for a class of switching regressions based on the characteristic function (CF). We show that with the exponential weighting ...
Dinghai Xu
CHI
1997
ACM
15 years 8 months ago
Overlaying Motion, Time and Distance in 3-Space
An innovative method for visually and functionally combining the elements of motion, time and distance in a three-dimensional computer animation is presented. At a glance, the ela...
Mike Pell
BMCBI
2007
114views more  BMCBI 2007»
15 years 4 months ago
Combination of scoring schemes for protein docking
Background: Docking algorithms are developed to predict in which orientation two proteins are likely to bind under natural conditions. The currently used methods usually consist o...
Philipp Heuser, Dietmar Schomburg