Sciweavers

891 search results - page 158 / 179
» Full Abstraction for PCF
Sort
View
EUROCRYPT
2003
Springer
14 years 27 days ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
HYBRID
2003
Springer
14 years 26 days ago
Mode Reconstruction for Source Coding and Multi-modal Control
s of Invited Presentations The Mathematics of Matter and the Mathematics of Mind . . . . . . . . . . . . . 1 David Berlinski A Grand Challenge: Full Reactive Modeling of a Multi-ce...
Adam Austin, Magnus Egerstedt
ICALP
2003
Springer
14 years 26 days ago
Similarity Matrices for Pairs of Graphs
Abstract. We introduce a concept of similarity between vertices of directed graphs. Let GA and GB be two directed graphs with respectively nA and nB vertices. We define a nA × nB...
Vincent D. Blondel, Paul Van Dooren
ICDT
2003
ACM
202views Database» more  ICDT 2003»
14 years 26 days ago
Condensed Representation of Database Repairs for Consistent Query Answering
Abstract. Repairing a database means bringing the database in accordance with a given set of integrity constraints by applying modifications that are as small as possible. In the ...
Jef Wijsen
AFRICACRYPT
2010
Springer
14 years 23 days ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...