Sciweavers

1806 search results - page 46 / 362
» Some Functions Computable with a Fused-Mac
Sort
View
95
Voted
IMA
2009
Springer
134views Cryptology» more  IMA 2009»
15 years 7 months ago
The Rayleigh Quotient of Bent Functions
The Rayleigh quotient of a bent function is an invariant under the action of the orthogonal group, and it measures the distance of the function to its dual. An efficient algorithm ...
Lars Eirik Danielsen, Matthew G. Parker, Patrick S...
121
Voted
IEEEIAS
2009
IEEE
15 years 7 months ago
One-way Hash Function Construction Based on Conservative Chaotic Systems
: An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length an...
Qing-hua Zhang, Han Zhang, Zhao-hui Li
89
Voted
SKG
2006
IEEE
15 years 6 months ago
Functional Dependency Maintenance and Lossless Join Decomposition in XML Model Decomposition
The paper studies “equality” in XML model decomposition. XML IFD, TFD, AFD and MVD are proposed. According to complexity of these FDs, four XML normal forms are presented. FD ...
Xia Li, Fei-yue Ye, Hong-juan Yuan, Wen-tao Peng
111
Voted
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 7 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
99
Voted
IEEEIAS
2007
IEEE
15 years 7 months ago
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
In recent years, mathematical, statistical and computer science methods have found extensive application in developing new procedures for crime investigation, prosecution and the ...
Katrin Franke, Sargur N. Srihari