Sciweavers

2303 search results - page 40 / 461
» The Cryptographic Abstract Machine
Sort
View
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
15 years 9 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
PKC
2010
Springer
130views Cryptology» more  PKC 2010»
15 years 9 months ago
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Abstract. This paper describes an extremely efficient squaring operation in the so-called ‘cyclotomic subgroup’ of F× q6 , for q ≡ 1 mod 6. This result arises from consideri...
Robert Granger, Michael Scott
CJ
2002
70views more  CJ 2002»
15 years 4 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
ICML
2004
IEEE
16 years 5 months ago
Dynamic abstraction in reinforcement learning via clustering
Abstraction in Reinforcement Learning via Clustering Shie Mannor shie@mit.edu Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA ...
Shie Mannor, Ishai Menache, Amit Hoze, Uri Klein
UC
2009
Springer
15 years 11 months ago
Abstract Geometrical Computation and Computable Analysis
Geometrical Computation and Computable Analysis J´erˆome Durand-Lose⋆ Laboratoire d’Informatique Fondamentale d’Orl´eans, Universit´e d’Orl´eans, B.P. 6759, F-45067 OR...
Jérôme Durand-Lose