Sciweavers

4934 search results - page 169 / 987
» complexity 2008
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 11 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo
IPL
2007
69views more  IPL 2007»
15 years 4 months ago
On the fixed-parameter tractability of the equivalence test of monotone normal forms
We consider the problem Monet—given two monotone formulas ϕ in DNF and ψ in CNF, decide whether they are equivalent. While Monet is probably not coNPhard, it is a long standin...
Matthias Hagen
TSP
2008
99views more  TSP 2008»
15 years 4 months ago
Sphere Decoding With a Probabilistic Tree Pruning
In this paper, we present a near ML-achieving sphere decoding algorithm that reduces the number of search operations in the sphere-constrained search. Specifically, by adding a pro...
Byonghyo Shim, Insung Kang
AAAI
2008
15 years 6 months ago
Measuring the Hardness of SAT Instances
The search of a precise measure of what hardness of SAT instances means for state-of-the-art solvers is a relevant research question. Among others, the space complexity of treelik...
Carlos Ansótegui, Maria Luisa Bonet, Jordi ...
CCCG
2008
15 years 6 months ago
Guaranteed Voronoi Diagrams of Uncertain Sites
In this paper we investigate the Voronoi diagram that is induced by a set of sites in the plane, where each site's precise location is uncertain but is known to be within a p...
Jeff Sember, William Evans