Sciweavers

1016 search results - page 140 / 204
» Linear error-block codes
Sort
View
TACAS
2010
Springer
146views Algorithms» more  TACAS 2010»
14 years 2 months ago
Ranking Function Synthesis for Bit-Vector Relations
Ranking function synthesis is a key aspect to the success of modern termination provers for imperative programs. While it is wellknown how to generate linear ranking functions for ...
Byron Cook, Daniel Kroening, Philipp Rümmer, ...
ACISP
2007
Springer
14 years 2 months ago
TCHo: A Hardware-Oriented Trapdoor Cipher
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
Jean-Philippe Aumasson, Matthieu Finiasz, Willi Me...
ISCAS
2005
IEEE
125views Hardware» more  ISCAS 2005»
14 years 1 months ago
A novel algorithm of spatial scalability for scrambled video
Although many researches have investigated transparent scrambling video techniques, an issue of which transcoding relates to downsizing scrambled video without unscrambling has ha...
YuanZhi Zou, Wen Gao
HPCC
2005
Springer
14 years 1 months ago
FAST-EVP: An Engine Simulation Tool
Abstract. FAST-EVP is a simulation tool for internal combustion engines running on cluster platforms; it has evolved from the KIVA-3V code base, but has been extensively rewritten ...
Gino Bella, Alfredo Buttari, Alessandro De Maio, F...
EUROCRYPT
2000
Springer
13 years 11 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham