Sciweavers

68 search results - page 5 / 14
» Axiomatization of an exponential similarity function
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 29 days ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
EUROCRYPT
2010
Springer
14 years 8 days ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
FCT
2009
Springer
14 years 2 months ago
Small-Space Analogues of Valiant's Classes
In the uniform circuit model of computation, the width of a boolean circuit exactly characterises the “space” complexity of the computed function. Looking for a similar relatio...
Meena Mahajan, B. V. Raghavendra Rao
BMCBI
2005
92views more  BMCBI 2005»
13 years 7 months ago
Predicting functional sites with an automated algorithm suitable for heterogeneous datasets
Background: In a previous report (La et al., Proteins, 2005), we have demonstrated that the identification of phylogenetic motifs, protein sequence fragments conserving the overal...
David La, Dennis R. Livesay
BMCBI
2005
121views more  BMCBI 2005»
13 years 7 months ago
Automated methods of predicting the function of biological sequences using GO and BLAST
Background: With the exponential increase in genomic sequence data there is a need to develop automated approaches to deducing the biological functions of novel sequences with hig...
Craig E. Jones, Ute Baumann, Alfred L. Brown