Sciweavers

1730 search results - page 24 / 346
» Algebra and Computation
Sort
View
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
13 years 11 months ago
Computing the Algebraic Immunity Efficiently
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very eff...
Frédéric Didier, Jean-Pierre Tillich
COMPGEOM
1989
ACM
13 years 11 months ago
Computing the Irreducible Real Factors and Components of an Algebraic Curve
We present algorithms that decompose an algebraic curve with rational coefficients in its defining bivariate equation into its irreducible real factors and its non-empty irreducib...
Erich Kaltofen
AISC
2008
Springer
13 years 9 months ago
Effective Set Membership in Computer Algebra and Beyond
Abstract. In previous work, we showed the importance of distinguishing "I know that X = Y " from "I don't know that X = Y ". In this paper we look at effec...
James H. Davenport
SIAMNUM
2010
114views more  SIAMNUM 2010»
13 years 2 months ago
Computing Multivariate Fekete and Leja Points by Numerical Linear Algebra
We discuss and compare two greedy algorithms, that compute discrete versions of Fekete-like points for multivariate compact sets by basic tools of numerical linear algebra. The fi...
Len Bos, Stefano De Marchi, Alvise Sommariva, Marc...
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb