Sciweavers

7924 search results - page 36 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
14 years 2 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
CRYPTO
2004
Springer
79views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Abstract. In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r-tuples of messages that all hash to the...
Antoine Joux
DATE
2005
IEEE
100views Hardware» more  DATE 2005»
13 years 10 months ago
The Role of Model-Level Transactors and UML in Functional Prototyping of Systems-on-Chip: A Software-Radio Application
Developing a functional prototype of a system-on-chip provides a unifying vehicle for model validation and system refinement. Keeping the prototype executable everal abstraction l...
Alexandre Chureau, Yvon Savaria, El Mostapha Aboul...
CSDA
2007
148views more  CSDA 2007»
13 years 8 months ago
Classifying densities using functional regression trees: Applications in oceanology
The problem of building a regression tree is considered when the response variable is a probability density function. Splitting criteria which are well adapted to measure the diss...
David Nerini, Badih Ghattas
ICDAR
2011
IEEE
12 years 8 months ago
Continuous CRF with Multi-scale Quantization Feature Functions Application to Structure Extraction in Old Newspaper
—We introduce quantization feature functions to represent continuous or large range discrete data into the symbolic CRF data representation. We show that doing this convertion in...
David Hebert, Thierry Paquet, Stéphane Nico...