Sciweavers

241 search results - page 15 / 49
» Lattices and Spherical Designs
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 21 days ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
TSP
2008
90views more  TSP 2008»
13 years 6 months ago
Array-Based QR-RLS Multichannel Lattice Filtering
An array-based algorithm for multichannel lattice filtering is proposed. The filter is formed by a set of units that are adapted locally and concurrently using recursions that clos...
J. Gomes, V. A. N. Barroso
TVCG
2008
103views more  TVCG 2008»
13 years 6 months ago
Practical Box Splines for Reconstruction on the Body Centered Cubic Lattice
We introduce a family of box splines for efficient, accurate and smooth reconstruction of volumetric data sampled on the Body Centered Cubic (BCC) lattice, which is the favorable v...
Alireza Entezari, Dimitri Van De Ville, Torsten M&...
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
14 years 25 days ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom
DAC
2010
ACM
13 years 10 months ago
Lattice-based computation of Boolean functions
This paper studies the implementation of Boolean functions with lattices of two-dimensional switches. Each switch is controlled by a Boolean literal. If the literal is 1, the swit...
Mustafa Altun, Marc D. Riedel