ACSC
8 years 6 months ago
2016 IEEE
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
ACSC
8 years 6 months ago
2016 IEEE
Abstract. Underlying symmetries in constraint satisfaction and optimization problems can make the search for solutions or optimal solutions much harder. In contrast, when symmetrie...
ACSC
8 years 6 months ago
2016 IEEE
In this paper we present an analysis of the impact of instant feedback and autograding in computer science education,
|