Sciweavers

223 search results - page 5 / 45
» Multivariates Polynomials for Hashing
Sort
View
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
13 years 5 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
COMBINATORICA
2000
157views more  COMBINATORICA 2000»
13 years 6 months ago
Concentration of Multivariate Polynomials and Its Applications
Suppose t1, ..., tn are independent random variables which take value either 0 or 1, and Y is a multi-variable polynomial in ti's with positive coefficients. We give a conditi...
Jeong Han Kim, Van H. Vu
NA
2007
70views more  NA 2007»
13 years 6 months ago
Multivariate polynomial interpolation: conjectures concerning GC-sets
GC-sets are subsets T of Rd of cardinality dim Πn for which, for each τ ∈ T, there are n hyperplanes whose union contains all of T except for τ, thus making interpolation to a...
Carl de Boor
CORR
2008
Springer
92views Education» more  CORR 2008»
13 years 7 months ago
On sign conditions over real multivariate polynomials
We present a new probabilistic algorithm to find a finite set of points intersecting the closure of each connected component of the realization of every sign condition over a fami...
Gabriela Jeronimo, Daniel Perrucci, Juan Sabia
CAP
2010
13 years 2 months ago
Parallel operations of sparse polynomials on multicores: I. multiplication and Poisson bracket
The multiplication of the sparse multivariate polynomials using the recursive representations is revisited to take advantage on the multicore processors. We take care of the memor...
Mickaël Gastineau