Sciweavers

438 search results - page 27 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
JLP
2008
129views more  JLP 2008»
13 years 7 months ago
Program and proof optimizations with type systems
We demonstrate a method for describing data-flow analyses based program optimizations as compositional type systems with a transformation component. Analysis results are presented...
Ando Saabas, Tarmo Uustalu
JMIV
2010
107views more  JMIV 2010»
13 years 2 months ago
Block Based Deconvolution Algorithm Using Spline Wavelet Packets
This paper proposes robust algorithms to deconvolve discrete noised signals and images. The solutions are derived as linear combinations of spline wavelet packets that minimize so...
Amir Averbuch, Valery A. Zheludev, Pekka Neittaanm...
TCOS
2010
13 years 2 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
DAC
2004
ACM
14 years 8 months ago
Fast statistical timing analysis handling arbitrary delay correlations
CT An efficient statistical timing analysis algorithm that can handle arbitrary (spatial and structural) causes of delay correlation is described. The algorithm derives the entire ...
Michael Orshansky, Arnab Bandyopadhyay
AUTOMATICA
2002
95views more  AUTOMATICA 2002»
13 years 7 months ago
Series expansions for analytic systems linear in control
This paper presents a series expansion for the evolution of a class of nonlinear systems characterized by constant input vector fields. We present a series expansion that can be c...
Francesco Bullo