Sciweavers

147 search results - page 3 / 30
» Logarithmic keying
Sort
View
SCN
2004
Springer
123views Communications» more  SCN 2004»
14 years 23 days ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
SIAMCO
2000
104views more  SIAMCO 2000»
13 years 7 months ago
Law of the Iterated Logarithm for a Constant-Gain Linear Stochastic Gradient Algorithm
We study almost-sure limiting properties, taken as 0, of the finite horizon sequence of random estimates { 0, 1, 2, . . . , T/ } for the linear stochastic gradient algorithm n+1 ...
J. A. Joslin, A. J. Heunis
CCS
2008
ACM
13 years 9 months ago
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the plain model with a non-interactive protocol in groups ...
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
MST
2006
97views more  MST 2006»
13 years 7 months ago
Optimal Implicit Dictionaries over Unbounded Universes
An array of n distinct keys can be sorted for logarithmic searching or can be organized as a heap for logarithmic updating, but it is unclear how to attain logarithmic time for bo...
Gianni Franceschini, Roberto Grossi
GRAPHICSINTERFACE
2004
13 years 8 months ago
Transfer Functions on a Logarithmic Scale for Volume Rendering
Manual opacity transfer function editing for volume rendering can be a difficult and counter-intuitive process. This paper proposes a logarithmically scaled editor, and argues tha...
Simeon Potts, Torsten Möller