Sciweavers

347 search results - page 61 / 70
» The Berlekamp-Massey Algorithm revisited
Sort
View
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
15 years 5 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
EMSOFT
2007
Springer
15 years 5 months ago
Slice-balancing H.264 video encoding for improved scalability of multicore decoding
With multicore architectures being introduced to the market, the research community is revisiting problems to evaluate them under the new preconditions set by those new systems. A...
Michael Roitzsch
WEBDB
2007
Springer
159views Database» more  WEBDB 2007»
15 years 4 months ago
A clustering-based sampling approach for refreshing search engine's database
Due to resource constraints, search engines usually have difficulties keeping the local database completely synchronized with the Web. To detect as many changes as possible, the ...
Qingzhao Tan, Ziming Zhuang, Prasenjit Mitra, C. L...
FC
2005
Springer
171views Cryptology» more  FC 2005»
15 years 4 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
INFOCOM
2003
IEEE
15 years 4 months ago
cing: Measuring Network-Internal Delays using only Existing Infrastructure
Abstract— Several techniques have been proposed for measuring network-internal delays. However, those that rely on router responses have questionable performance, and all propose...
Kostas G. Anagnostakis, Michael Greenwald, Raphael...