Sciweavers

147 search results - page 3 / 30
» Logarithmic keying
Sort
View
159
Voted
SCN
2004
Springer
123views Communications» more  SCN 2004»
15 years 9 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
116
Voted
SIAMCO
2000
104views more  SIAMCO 2000»
15 years 3 months ago
Law of the Iterated Logarithm for a Constant-Gain Linear Stochastic Gradient Algorithm
We study almost-sure limiting properties, taken as 0, of the finite horizon sequence of random estimates { 0, 1, 2, . . . , T/ } for the linear stochastic gradient algorithm n+1 ...
J. A. Joslin, A. J. Heunis
127
Voted
CCS
2008
ACM
15 years 5 months ago
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the plain model with a non-interactive protocol in groups ...
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
108
Voted
MST
2006
97views more  MST 2006»
15 years 3 months ago
Optimal Implicit Dictionaries over Unbounded Universes
An array of n distinct keys can be sorted for logarithmic searching or can be organized as a heap for logarithmic updating, but it is unclear how to attain logarithmic time for bo...
Gianni Franceschini, Roberto Grossi
126
Voted
GRAPHICSINTERFACE
2004
15 years 5 months ago
Transfer Functions on a Logarithmic Scale for Volume Rendering
Manual opacity transfer function editing for volume rendering can be a difficult and counter-intuitive process. This paper proposes a logarithmically scaled editor, and argues tha...
Simeon Potts, Torsten Möller