Sciweavers

205 search results - page 12 / 41
» Aspects of Pairing Inversion
Sort
View
DAC
1989
ACM
13 years 11 months ago
An Efficient Finite Element Method for Submicron IC Capacitance Extraction
We present an accurate and efficient method for extraction of parasitic capacitances in submicron integrated circuits. The method uses a 3-D finite element model in which the cond...
N. P. van der Meijs, Arjan J. van Genderen
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
ACL
2010
13 years 5 months ago
Discriminative Pruning for Discriminative ITG Alignment
While Inversion Transduction Grammar (ITG) has regained more and more attention in recent years, it still suffers from the major obstacle of speed. We propose a discriminative ITG...
Shujie Liu, Chi-Ho Li, Ming Zhou
IJNSEC
2011
108views more  IJNSEC 2011»
13 years 2 months ago
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
We first analyze the security of a short signature scheme without random oracles called ZCSM scheme and point out that it cannot support unforgeable under the chosen message and ...
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li...
ICNP
1999
IEEE
13 years 11 months ago
Concast: Design and Implementation of a New Network Service
This paper introduces concast, a new network service. Concast is the inverse of multicast: multiple sources send messages toward the same destination, which results in a single me...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...