Sciweavers

721 search results - page 88 / 145
» Almost universal graphs
Sort
View
ASIACRYPT
2007
Springer
14 years 1 months ago
On Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have propo...
Goce Jakimoski, K. P. Subbalakshmi
COCO
2009
Springer
113views Algorithms» more  COCO 2009»
14 years 1 months ago
Extractors for Low-Weight Affine Sources
We give polynomial time computable extractors for low-weight affince sources. A distribution is affine if it samples a random points from some unknown low dimensional subspace of ...
Anup Rao
DAS
2006
Springer
14 years 1 months ago
Finding the Best-Fit Bounding-Boxes
The bounding-box of a geometric shape in 2D is the rectangle with the smallest area in a given orientation (usually upright) that complete contains the shape. The best-fit bounding...
Bo Yuan, Leong Kwoh, Chew Lim Tan
CRYPTO
2006
Springer
129views Cryptology» more  CRYPTO 2006»
13 years 12 months ago
New Proofs for
HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent...
Mihir Bellare
LREC
2008
142views Education» more  LREC 2008»
13 years 11 months ago
RACAI's Linguistic Web Services
Nowadays, there are hundreds of Natural Language Processing applications and resources for different languages that are developed and/or used, almost exclusively with a few but no...
Dan Tufis, Radu Ion, Alexandru Ceausu, Dan Stefane...