225
click to vote
ACSC
9 years 10 months ago
2016 IEEE
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
131
click to vote
ACSC
9 years 10 months ago
2016 IEEE
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
126
click to vote
ACSC
9 years 10 months ago
2016 IEEE
In this paper we present an analysis of the impact of instant feedback and autograding in computer science education,
|