Sciweavers

438 search results - page 66 / 88
» The forest hiding problem
Sort
View
NDSS
2000
IEEE
15 years 4 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin
DSOM
2000
Springer
15 years 4 months ago
Middleware Platform Management Based on Portable Interceptors
Abstract. Object middleware is an enabling technology for distributed applications that are required to operate in heterogeneous computing and communication environments. Although ...
Olaf Kath, Aart van Halteren, Frank Stoinski, Maar...
IPPS
1999
IEEE
15 years 4 months ago
Optimizing Irregular HPF Applications using Halos
This paper presents language features for High Performance Fortran HPF to specify non-local access patterns of distributed arrays, called halos, and to control the communication as...
Siegfried Benkner
CRYPTO
1998
Springer
105views Cryptology» more  CRYPTO 1998»
15 years 4 months ago
An Efficient Discrete Log Pseudo Random Generator
The exponentiation function in a finite field of order p (a prime number) is believed to be a one-way function. It is well known that O(log log p) bits are simultaneously hard for ...
Sarvar Patel, Ganapathy S. Sundaram
ARCS
2006
Springer
15 years 3 months ago
Dynamic Dictionary-Based Data Compression for Level-1 Caches
Abstract. Data cache compression is actively studied as a venue to make better use of onchip transistors, increase apparent capacity of caches, and hide the long memory latencies. ...
Georgios Keramidas, Konstantinos Aisopos, Stefanos...