Sciweavers

1818 search results - page 201 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
105
Voted
CRYPTO
2007
Springer
104views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Converse...
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q....
102
Voted
TAMC
2007
Springer
15 years 9 months ago
Working with the LR Degrees
We say that A ≤LR B if every B-random number is A-random. Intuitively this means that if oracle A can identify some patterns on some real γ, oracle B can also find patterns on ...
George Barmpalias, Andrew E. M. Lewis, Mariya Ivan...
131
Voted
COMPGEOM
2004
ACM
15 years 9 months ago
The geometric thickness of low degree graphs
We prove that the geometric thickness of graphs whose maximum degree is no more than four is two. In our proofs, we present a space and time efficient embedding technique for gra...
Christian A. Duncan, David Eppstein, Stephen G. Ko...
124
Voted
IMTCI
2004
Springer
15 years 9 months ago
Mobile Agents: Preserving Privacy and Anonymity
The paper presents two new methods for providing mobile agents with privacy and anynomity. The proposed schemes are based on different cryptographic primitives: a secret-sharing s...
Aneta Zwierko, Zbigniew Kotulski
151
Voted
RTSS
2003
IEEE
15 years 9 months ago
Multiprocessor EDF and Deadline Monotonic Schedulability Analysis
Schedulability tests are presented for preemptive earliest-deadline-first and deadline-monotonic scheduling of periodic or sporadic real-time tasks on a singlequeue Ñ-server sys...
Theodore P. Baker