Sciweavers

3238 search results - page 67 / 648
» Multi-return function call
Sort
View
CRYPTO
2004
Springer
102views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Complete Classification of Bilinear Hard-Core Functions
Let f : {0, 1}n {0, 1}l be a one-way function. A function h : {0, 1}n {0, 1}m is called a hard-core function for f if, when given f(x) for a (secret) x drawn uniformly from {0, 1}n...
Thomas Holenstein, Ueli M. Maurer, Johan Sjöd...
IJON
2006
103views more  IJON 2006»
13 years 7 months ago
Evolutionary system for automatically constructing and adapting radial basis function networks
This article presents a new system for automatically constructing and training radial basis function networks based on original evolutionary computing methods. This system, called...
Daniel Manrique, Juan Rios, Alfonso Rodrígu...
FSE
1999
Springer
92views Cryptology» more  FSE 1999»
14 years 2 days ago
A New Characterization of Almost Bent Functions
We study the functions from Fm 2 into Fm 2 for odd m which oppose an optimal resistance to linear cryptanalysis. These functions are called almost bent. It is known that almost ben...
Anne Canteaut, Pascale Charpin, Hans Dobbertin
ICANN
2009
Springer
14 years 2 months ago
Evolving Memory Cell Structures for Sequence Learning
The best recent supervised sequence learning methods use gradient descent to train networks of miniature nets called memory cells. The most popular cell structure seems somewhat ar...
Justin Bayer, Daan Wierstra, Julian Togelius, J&uu...
FSE
2005
Springer
108views Cryptology» more  FSE 2005»
14 years 1 months ago
DPA Attacks and S-Boxes
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-b...
Emmanuel Prouff