Sciweavers

69 search results - page 8 / 14
» rsa 2008
Sort
View
RSA
2008
94views more  RSA 2008»
14 years 9 months ago
Random mappings with exchangeable in-degrees
In this paper we introduce a new random mapping model, T ^D n , which maps the set {1, 2, ..., n} into itself. The random mapping T ^D n is constructed using a collection of excha...
Jennie C. Hansen, Jerzy Jaworski
66
Voted
RSA
2008
81views more  RSA 2008»
14 years 9 months ago
Analyzing linear mergers
Mergers are functions that transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one of the input sources has minentropy rate ...
Zeev Dvir, Ran Raz
BMCBI
2008
116views more  BMCBI 2008»
14 years 9 months ago
Impact of residue accessible surface area on the prediction of protein secondary structures
Background: The problem of accurate prediction of protein secondary structure continues to be one of the challenging problems in Bioinformatics. It has been previously suggested t...
Amir Momen-Roknabadi, Mehdi Sadeghi, Hamid Pezeshk...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
14 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
JOC
2008
92views more  JOC 2008»
14 years 9 months ago
Cryptanalysis of ISO/IEC 9796-1
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
Don Coppersmith, Jean-Sébastien Coron, Fran...