Sciweavers

1292 search results - page 1 / 259
» A Designer's Guide to KEMs
Sort
View
IMA
2003
Springer
114views Cryptology» more  IMA 2003»
14 years 5 days ago
A Designer's Guide to KEMs
Alexander W. Dent
ACISP
2008
Springer
13 years 8 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
SOCO
2010
Springer
13 years 1 months ago
Designing multilayer perceptrons using a Guided Saw-tooth Evolutionary Programming Algorithm
In this paper, a diversity generating mechanism is proposed for an Evolutionary Programming (EP) algorithm that determines the basic structure of Multilayer Perceptron classifiers ...
Pedro Antonio Gutiérrez, César Herv&...
TOG
2012
181views Communications» more  TOG 2012»
11 years 9 months ago
Guided exploration of physically valid shapes for furniture design
Geometric modeling and the physical validity of shapes are traditionally considered independently. This makes creating aesthetically pleasing yet physically valid models challengi...
Nobuyuki Umetani, Takeo Igarashi, Niloy J. Mitra