Sciweavers

268 search results - page 25 / 54
» An Analysis of Bitstate Hashing
Sort
View
ASIACRYPT
2001
Springer
15 years 8 months ago
Practical Construction and Analysis of Pseudo-Randomness Primitives
Abstract. We give a careful, fixed-size parameter analysis of a standard [1,4] way to form a pseudorandom generator by iterating a one-way function and then pseudo-random function...
Johan Håstad, Mats Näslund
122
Voted
SAINT
2008
IEEE
15 years 10 months ago
Analysis of a Self-Organizing Maintenance Algorithm under Constant Churn
An increasing proportion of distributed hash tables (DHTs) maintain additional routing information regarding each node’s immediately surrounding neighbors in a network overlay. ...
Richard Price, Tien Tuan Anh Dinh, Georgios K. The...
EUROCRYPT
2000
Springer
15 years 7 months ago
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme's security is based on two assumptions namely the strong RSA ass...
Jean-Sébastien Coron, David Naccache
ICDAR
2009
IEEE
15 years 10 months ago
Real-Time Camera-Based Recognition of Characters and Pictograms
Camera-based character recognition systems should have the capability of quick operation and recognizing perspectively distorted texts in a complex layout. In this paper, in order...
Masakazu Iwamura, Tomohiko Tsuji, Akira Horimatsu,...
CORR
2011
Springer
124views Education» more  CORR 2011»
14 years 10 months ago
Parallel Recursive State Compression for Free
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a multi-core tree-based...
Alfons Laarman, Jaco van de Pol, Michael Weber 000...