Sciweavers

230 search results - page 14 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
FROCOS
2005
Springer
14 years 1 months ago
Logical Analysis of Hash Functions
Abstract. In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducin...
Dejan Jovanovic, Predrag Janicic
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
13 years 5 months ago
K-AP: Generating Specified K Clusters by Efficient Affinity Propagation
Abstract--The Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007) provides an understandable, nearly optimal summary of a data set. However, it suffers...
Xiangliang Zhang, Wei Wang, Kjetil Nørv&ari...
AUTOMATICA
2007
70views more  AUTOMATICA 2007»
13 years 7 months ago
Squaring the circle: An algorithm for generating polyhedral invariant sets from ellipsoidal ones
This paper presents a new (geometrical) approach to the computation of polyhedral (robustly) positively invariant (PI) sets for general (possibly discontinuous) nonlinear discrete...
A. Alessio, Mircea Lazar, Alberto Bemporad, W. P. ...
JSC
2002
61views more  JSC 2002»
13 years 7 months ago
Subquadratic Computation of Vector Generating Polynomials and Improvement of the Block Wiedemann Algorithm
This paper describes a new algorithm for computing linear generators (vector generating polynomials) for matrix sequences, running in subquadratic time. This algorithm applies in ...
Emmanuel Thomé
DGCI
2003
Springer
14 years 26 days ago
The Generation of N Dimensional Shape Primitives
This paper describes a method to accelerate the generation of shape primitives for N-dimensional images N X . These shape primitives can be used in conditions for topology preservi...
Pieter P. Jonker, Stina Svensson