Sciweavers

2849 search results - page 93 / 570
» As We Should Have Thought
Sort
View
ASIACRYPT
2006
Springer
14 years 1 months ago
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
We point out that the seemingly strong pseudorandom oracle preserving (PRO-Pr) property of hash function domain-extension transforms defined and implemented by Coron et. al. [12] ...
Mihir Bellare, Thomas Ristenpart
ICIP
2010
IEEE
13 years 8 months ago
Semi-supervised regression with temporal image sequences
We consider a semi-supervised regression setting where we have temporal sequences of partially labeled data, under the assumption that the labels should vary slowly along a sequen...
Ling Xie, Miguel Á. Carreira-Perpiñ&...
APSEC
2005
IEEE
14 years 3 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
14 years 3 months ago
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
The Unbalanced Oil and Vinegar scheme (UOV) is a signature scheme based on multivariate quadratic equations. It uses m equations and n variables. A total of v of these are called ...
An Braeken, Christopher Wolf, Bart Preneel
CACM
2010
179views more  CACM 2010»
13 years 10 months ago
x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors
Exploiting the multiprocessors that have recently become ubiquitous requires high-performance and reliable concurrent systems code, for concurrent data structures, operating syste...
Peter Sewell, Susmit Sarkar, Scott Owens, Francesc...