Sciweavers

4714 search results - page 53 / 943
» The Complexity of Iterated Multiplication
Sort
View
RTAS
1998
IEEE
15 years 2 months ago
Bounding Loop Iterations for Timing Analysis
Static timing analyzers need to know the minimum and maximum number of iterations associated with each loop in a real-time program so accurate timing predictions can be obtained. ...
Christopher A. Healy, Mikael Sjödin, Viresh R...
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 1 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir

Publication
334views
15 years 6 months ago
Rollout Sampling Approximate Policy Iteration
Several researchers have recently investigated the connection between reinforcement learning and classification. We are motivated by proposals of approximate policy iteration schem...
Christos Dimitrakakis, Michail G. Lagoudakis
PIMRC
2008
IEEE
15 years 4 months ago
Iterative EM based channel estimation for KSP-OFDM
Abstract—This paper proposes a new iterative channel estimation algorithm for known symbol padding (KSP) Orthogonal Frequency Division Multiplexing (OFDM) based on the Expectatio...
Dieter Van Welden, Heidi Steendam
CRYPTO
2004
Springer
79views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Abstract. In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r-tuples of messages that all hash to the...
Antoine Joux