Sciweavers

785 search results - page 107 / 157
» Teaching computer graphics constructively
Sort
View
DCC
2008
IEEE
16 years 2 months ago
A synthetic indifferentiability analysis of some block-cipher-based hash functions
At ASIACRYPT 2006, Chang et al. analyzed the indifferentiability of some popular hash functions based on block ciphers, namely, the twenty collision resistant PGV, the MDC2 and th...
Zheng Gong, Xuejia Lai, Kefei Chen
DCC
2008
IEEE
16 years 2 months ago
The trace of an optimal normal element and low complexity normal bases
Let Fq be a finite field and consider an extension Fqn where an optimal normal element exists. Using the trace of an optimal normal element in Fqn , we provide low complexity norma...
Maria Christopoulou, Theodoulos Garefalakis, Danie...
DCC
2007
IEEE
16 years 2 months ago
A sequence approach to linear perfect hash families
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of order q consists of a set S = {1, . . . , s} of linear functionals from V to F ...
Susan G. Barwick, Wen-Ai Jackson
DCC
2006
IEEE
16 years 2 months ago
Non-Asymptotic Design of Finite State Universal Predictors for Individual Sequences
In this work we consider the problem of universal prediction of individual sequences where the universal predictor is a deterministic finite state machine, with a fixed, relativel...
Amir Ingber, Meir Feder
DCC
2002
IEEE
16 years 2 months ago
On Complete Arcs Arising from Plane Curves
We point out an interplay between Fq-Frobenius non-classical plane curves and complete (k, d)-arcs in P2 (Fq). A typical example that shows how this works is the one concerning an ...
Massimo Giulietti, Fernanda Pambianco, Fernando To...