Sciweavers

27692 search results - page 189 / 5539
» Where is ...
Sort
View
101
Voted
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
92
Voted
ECAL
2007
Springer
15 years 7 months ago
Emergence of Genetic Coding: An Information-Theoretic Model
This paper1 introduces a simple model for evolutionary dynamics approaching the “coding threshold”, where the capacity to symbolically represent nucleic acid sequences emerges ...
Piraveenan Mahendra, Daniel Polani, Mikhail Prokop...
68
Voted
ESA
2007
Springer
100views Algorithms» more  ESA 2007»
15 years 7 months ago
Nash Equilibria in Voronoi Games on Graphs
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices (customers) are then assigned to closest facilities and...
Christoph Dürr, Nguyen Kim Thang
94
Voted
EUROPAR
2007
Springer
15 years 7 months ago
Periodic Load Balancing on the N -Cycle: Analytical and Experimental Evaluation
Abstract. We investigate the following very simple load-balancing algorithm on the N-cycle (N even) which we call Odd-Even Transposition Balancing (OETB). The edges of the cycle ar...
Christian Rieß, Rolf Wanka
75
Voted
FSE
2007
Springer
105views Cryptology» more  FSE 2007»
15 years 7 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima