Sciweavers

933 search results - page 16 / 187
» Monotone Complexity of a Pair
Sort
View
ICISC
2007
96views Cryptology» more  ICISC 2007»
13 years 9 months ago
Colliding Message Pair for 53-Step HAS-160
We present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about 235 hash computations. The attack is based on the work of Cho e...
Florian Mendel, Vincent Rijmen
EUROCRYPT
2010
Springer
14 years 8 days ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
CORR
2006
Springer
76views Education» more  CORR 2006»
13 years 7 months ago
Complexity Constrained Noise-Free CDMA: Optimal Power Distribution and Spectral Efficiency
The issue of multiuser cooperation in a complexity constrained noise-free CDMA channel is addressed. Multiuser cooperation is imperative if conventional demodulation is expected to...
Rodrigo de Miguel, Ralf R. Müller
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 6 months ago
Computational Complexity of Avalanches in the Kadanoff two-dimensional Sandpile Model
In this paper we prove that the avalanche problem for the Kadanoff sandpile model (KSPM) is P-complete for two-dimensions. Our proof is based on a reduction from the monotone circ...
Eric Goles Chacc, Bruno Martin
RTA
2009
Springer
14 years 2 months ago
Dependency Pairs and Polynomial Path Orders
Abstract. We show how polynomial path orders can be employed efficiently in conjunction with weak innermost dependency pairs to automatically certify the polynomial runtime comple...
Martin Avanzini, Georg Moser