Sciweavers

6120 search results - page 61 / 1224
» The Power of Linear Functions
Sort
View
ICISC
2007
75views Cryptology» more  ICISC 2007»
15 years 1 months ago
Cryptanalysis of a Hash Function Proposed at ICISC 2006
A simple method for constructing collisions for Shpilrain’s polynomial-based hash function from ICISC 2006 is presented. The attack relies on elementary linear algebra and can be...
Willi Geiselmann, Rainer Steinwandt
DAC
2005
ACM
15 years 1 months ago
Total power reduction in CMOS circuits via gate sizing and multiple threshold voltages
Minimizing power consumption is one of the most important objectives in IC design. Resizing gates and assigning different Vt’s are common ways to meet power and timing budgets. ...
Feng Gao, John P. Hayes
CIE
2008
Springer
15 years 1 months ago
Hybrid Functional Interpretations
We show how different functional interpretations can be combined via a multi-modal linear logic. A concrete hybrid of Kreisel's modified realizability and G
Mircea-Dan Hernest, Paulo Oliva
AMC
2006
105views more  AMC 2006»
14 years 12 months ago
Stable numerical methods for conservation laws with discontinuous flux function
We develop numerical methods for solving nonlinear equations of conservation laws with flux function that depends on discontinuous coefficients. Using a relaxation approximation, ...
Mohammed Seaïd
JCT
2000
103views more  JCT 2000»
14 years 11 months ago
A Combinatorial Algorithm Minimizing Submodular Functions in Strongly Polynomial Time
We give a strongly polynomial-time algorithm minimizing a submodular function f given by a value-giving oracle. The algorithm does not use the ellipsoid method or any other linear ...
Alexander Schrijver