Sciweavers

3228 search results - page 450 / 646
» Computationally Sound Proofs
Sort
View
156
Voted
ASIACRYPT
2006
Springer
15 years 7 months ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval
129
Voted
ASIACRYPT
2006
Springer
15 years 7 months ago
KFC - The Krazy Feistel Cipher
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the adv...
Thomas Baignères, Matthieu Finiasz
151
Voted
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 7 months ago
On Completeness of Logical Relations for Monadic Types
Interesting properties of programs can be expressed using contextual equivalence. The latter is difficult to prove directly, hence (pre-)logical relations are often used as a tool ...
Slawomir Lasota, David Nowak, Yu Zhang
113
Voted
CIARP
2006
Springer
15 years 7 months ago
A New Approach to Multi-class Linear Dimensionality Reduction
Linear dimensionality reduction (LDR) is quite important in pattern recognition due to its efficiency and low computational complexity. In this paper, we extend the two-class Chern...
Luis Rueda, Myriam Herrera
137
Voted
AFRIGRAPH
2001
ACM
15 years 7 months ago
Exploiting coherence of shadow rays
We present independent method to reduce the number of shadow ray tests. It can be used with standard acceleration ray tracing algorithms. Our method is conservative and produces t...
Andrzej Lukaszewski