Sciweavers

4270 search results - page 5 / 854
» A Permutation Approach to Validation
Sort
View
ICALP
2004
Springer
14 years 23 days ago
Simple Permutations Mix Well
We study the random composition of a small family of O(n3 ) simple permutations on {0, 1}n . Specifically we ask what is the number of compositions needed to achieve a permutatio...
Shlomo Hoory, Avner Magen, Steven Myers, Charles R...
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
14 years 21 days ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 1 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
ICASSP
2009
IEEE
14 years 2 months ago
Using the scaling ambiguity for filter shortening in convolutive blind source separation
In this paper, we propose to use the scaling ambiguity of convolutive blind source separation for shortening the unmixing filters. An often used approach for separating convoluti...
Radoslaw Mazur, Alfred Mertins