Sciweavers

877 search results - page 145 / 176
» Full Abstraction for HOPLA
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 2 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
WEA
2005
Springer
107views Algorithms» more  WEA 2005»
14 years 2 months ago
Local Clustering of Large Graphs by Approximate Fiedler Vectors
Vectors [Extended Abstract] Pekka Orponen and Satu Elisa Schaeffer Laboratory for Theoretical Computer Science, P.O. Box 5400 FI-02015 TKK Helsinki University of Technology, Finlan...
Pekka Orponen, Satu Elisa Schaeffer
AMEC
2004
Springer
14 years 2 months ago
Revenue Failures and Collusion in Combinatorial Auctions and Exchanges with VCG Payments
Abstract. In a combinatorial auction, there are multiple items for sale, and bidders are allowed to place a bid on a bundle of these items rather than just on the individual items....
Vincent Conitzer, Tuomas Sandholm
APWEB
2004
Springer
14 years 2 months ago
Multiresolution Spatial Databases: Making Web-Based Spatial Applications Faster
Abstract. Spatial data has now been used extensively in the Web environment, providing online customized maps and supporting map-based applications. The full potential of Web-based...
Xiaofang Zhou, Sham Prasher, Sai Sun, Kai Xu 0003
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 2 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...