Sciweavers

953 search results - page 53 / 191
» A note on the paper
Sort
View
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
14 years 7 days ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
DIGITALCITIES
2000
Springer
14 years 2 days ago
Understanding Digital Cities
As a platform for community networks, information spaces using the city metaphor are being developed in worldwide. This paper comparesthe trials of digital cities. Four digital cit...
Toru Ishida
GECCO
2006
Springer
141views Optimization» more  GECCO 2006»
13 years 11 months ago
Applicability issues of the real-valued negative selection algorithms
The paper examines various applicability issues of the negative selection algorithms (NSA). Recently, concerns were raised on the use of NSAs, especially those using real-valued r...
Zhou Ji, Dipankar Dasgupta
EUROCRYPT
2000
Springer
13 years 11 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
LREC
2010
195views Education» more  LREC 2010»
13 years 9 months ago
The MuLeXFoR Database: Representing Word-Formation Processes in a Multilingual Lexicographic Environment
This paper introduces a new lexicographic resource, the MuLeXFoR database, which aims to present word-formation processes in a multilingual environment. Morphological items repres...
Bruno Cartoni, Marie-Aude Lefer