Sciweavers

1818 search results - page 209 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
118
Voted
ASIACRYPT
2006
Springer
15 years 7 months ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
124
Voted
DATE
2004
IEEE
184views Hardware» more  DATE 2004»
15 years 7 months ago
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements
We show how to automatically verify that complex XScale-like pipelined machine models satisfy the same safety and liveness properties as their corresponding instruction set archit...
Panagiotis Manolios, Sudarshan K. Srinivasan
124
Voted
CIE
2006
Springer
15 years 7 months ago
Lower Bounds Using Kolmogorov Complexity
Abstract. In this paper, we survey a few recent applications of Kolmogorov complexity to lower bounds in several models of computation. We consider KI complexity of Boolean functio...
Sophie Laplante
116
Voted
EEE
2004
IEEE
15 years 7 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar
129
Voted
COLT
2006
Springer
15 years 7 months ago
Maximum Entropy Distribution Estimation with Generalized Regularization
Abstract. We present a unified and complete account of maximum entropy distribution estimation subject to constraints represented by convex potential functions or, alternatively, b...
Miroslav Dudík, Robert E. Schapire