Sciweavers

626 search results - page 58 / 126
» Abstract Modularity
Sort
View
EUROCRYPT
2007
Springer
14 years 3 months ago
Mesh Signatures
sion of an extended abstract to be published in Advances in Cryptology—EUROCRYPT 2007, Springer-Verlag, 2007. Available online from the IACR Cryptology ePrint Archive as Report 2...
Xavier Boyen
EUROCRYPT
2005
Springer
14 years 2 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
ECOOP
2004
Springer
14 years 2 months ago
Use Case Level Pointcuts
Software developers create a variety of artifacts that model viour of applications at different levels of abstraction; e.g. use cases, sequence diagrams, and source code. Aspect-o...
Jonathan Sillito, Christopher Dutchyn, Andrew Davi...
OOIS
2001
Springer
14 years 1 months ago
An Object-Oriented Framework for Developing Information Retrieval Applications
Abstract. Design and development of information retrieval IR systems is a complex and expensive process. In the process of building an IR system, developers need to explore a lar...
Joemon M. Jose, David G. Hendry, David J. Harper
EUROCRYPT
2000
Springer
14 years 12 days ago
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication
Abstract. This paper proposes a fast parallel Montgomery multiplication algorithm based on Residue Number Systems (RNS). It is easy to construct a fast modular exponentiation by ap...
Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano,...