Sciweavers

338 search results - page 29 / 68
» Differential equations for algebraic functions
Sort
View
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 7 months ago
A constructive and unifying framework for zero-bit watermarking
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in a piece of content. The watermark detector checks ...
Teddy Furon
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 19 days ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
DCC
2006
IEEE
14 years 7 months ago
Evaluation codes and plane valuations
Abstract. We apply tools coming from singularity theory, as Hamburger-Noether expansions, and from valuation theory, as generating sequences, to explicitly describe order functions...
C. Galindo, M. Sanchis
STOC
2002
ACM
126views Algorithms» more  STOC 2002»
14 years 7 months ago
Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem
We give polynomial-time quantum algorithms for three problems from computational algebraic number theory. The first is Pell's equation. Given a positive nonsquare integer d, ...
Sean Hallgren
ADCM
2005
163views more  ADCM 2005»
13 years 7 months ago
Matrix-valued radial basis functions: stability estimates and applications
Radial basis functions (RBFs) have found important applications in areas such as signal processing, medical imaging, and neural networks since the early 1980's. Several appli...
Svenja Lowitzsch