Sciweavers

69 search results - page 8 / 14
» rsa 2008
Sort
View
RSA
2008
94views more  RSA 2008»
14 years 11 months ago
Random mappings with exchangeable in-degrees
In this paper we introduce a new random mapping model, T ^D n , which maps the set {1, 2, ..., n} into itself. The random mapping T ^D n is constructed using a collection of excha...
Jennie C. Hansen, Jerzy Jaworski
RSA
2008
81views more  RSA 2008»
14 years 11 months ago
Analyzing linear mergers
Mergers are functions that transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one of the input sources has minentropy rate ...
Zeev Dvir, Ran Raz
BMCBI
2008
116views more  BMCBI 2008»
15 years 14 hour ago
Impact of residue accessible surface area on the prediction of protein secondary structures
Background: The problem of accurate prediction of protein secondary structure continues to be one of the challenging problems in Bioinformatics. It has been previously suggested t...
Amir Momen-Roknabadi, Mehdi Sadeghi, Hamid Pezeshk...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
14 years 11 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
JOC
2008
92views more  JOC 2008»
14 years 12 months ago
Cryptanalysis of ISO/IEC 9796-1
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
Don Coppersmith, Jean-Sébastien Coron, Fran...