Sciweavers

373 search results - page 6 / 75
» Abstract Geometrical Computation for Black Hole Computation
Sort
View
GI
2001
Springer
13 years 12 months ago
Extending Sunit to Test Components
To ensure the deployment of reusable and reliable components, it is important to verify their functionality. In this paper, we present a framework for component testing, an extens...
Ludger Martin, Elke Siemon
GIAE
2004
Springer
181views Mathematics» more  GIAE 2004»
14 years 22 days ago
Applications of Conformal Geometric Algebra in Computer Vision and Graphics
Abstract. This paper introduces the mathematical framework of conformal geometric algebra (CGA) as a language for computer graphics and computer vision. Specifically it discusses ...
Rich Wareham, Jonathan Cameron, Joan Lasenby
PKC
2007
Springer
109views Cryptology» more  PKC 2007»
14 years 1 months ago
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Abstract. In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosyst...
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wa...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 27 days ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
ENTCS
2006
135views more  ENTCS 2006»
13 years 7 months ago
Initializing Mutually Referential Abstract Objects: The Value Recursion Challenge
zing Mutually Referential Abstract Objects: The Value Recursion Challenge Don Syme 1 Microsoft Research, Cambridge, U.K. Mutual dependencies between objects arise frequently in pr...
Don Syme