Sciweavers

268 search results - page 25 / 54
» An Analysis of Bitstate Hashing
Sort
View
ASIACRYPT
2001
Springer
14 years 1 months ago
Practical Construction and Analysis of Pseudo-Randomness Primitives
Abstract. We give a careful, fixed-size parameter analysis of a standard [1,4] way to form a pseudorandom generator by iterating a one-way function and then pseudo-random function...
Johan Håstad, Mats Näslund
SAINT
2008
IEEE
14 years 3 months ago
Analysis of a Self-Organizing Maintenance Algorithm under Constant Churn
An increasing proportion of distributed hash tables (DHTs) maintain additional routing information regarding each node’s immediately surrounding neighbors in a network overlay. ...
Richard Price, Tien Tuan Anh Dinh, Georgios K. The...
EUROCRYPT
2000
Springer
14 years 21 days ago
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme's security is based on two assumptions namely the strong RSA ass...
Jean-Sébastien Coron, David Naccache
ICDAR
2009
IEEE
14 years 3 months ago
Real-Time Camera-Based Recognition of Characters and Pictograms
Camera-based character recognition systems should have the capability of quick operation and recognizing perspectively distorted texts in a complex layout. In this paper, in order...
Masakazu Iwamura, Tomohiko Tsuji, Akira Horimatsu,...
CORR
2011
Springer
124views Education» more  CORR 2011»
13 years 3 months ago
Parallel Recursive State Compression for Free
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a multi-core tree-based...
Alfons Laarman, Jaco van de Pol, Michael Weber 000...