Sciweavers

2409 search results - page 106 / 482
» Building Components from Functions
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
14 years 9 days ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
ICVGIP
2004
14 years 4 days ago
Modeling Signs Using Functional Data Analysis
1 We present a functional data analysis (FDA) based method to statistically model continuous signs of the American Sign Language (ASL) for use in the recognition of signs in contin...
Sunita Nayak, Sudeep Sarkar, Kuntal Sengupta
ICFP
2009
ACM
14 years 3 months ago
Experience report: embedded, parallel computer-vision with a functional DSL
This paper presents our experience using a domain-specific functional language, WaveScript, to build embedded sensing applications used in scientific research. We focus on a rec...
Ryan Newton, Teresa Ko
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 5 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ICFP
2005
ACM
14 years 10 months ago
A logical analysis of aliasing in imperative higher-order functions
We present a compositional program logic for call-by-value imperative higher-order functions with general forms of aliasing, which can arise from the use of reference names as fun...
Martin Berger, Kohei Honda, Nobuko Yoshida