Sciweavers

7924 search results - page 79 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
ISCAS
2002
IEEE
116views Hardware» more  ISCAS 2002»
14 years 1 months ago
Antisymmetries in the realization of Boolean functions
New symmetries of degree two are introduced, along with spectral techniques for identifying these symmetries. Some applications of these symmetries are discussed, in particular th...
Jacqueline E. Rice, Jon C. Muzio
IJIPT
2007
110views more  IJIPT 2007»
13 years 8 months ago
Towards an application framework for context-aware m-health applications
— Several social issues, like aging, stimulate the use of mobile ICT applications for mobile healthcare (e.g., telemonitoring). To support novel m-health applications, the conseq...
Tom Broens, Aart van Halteren, Marten van Sinderen...
CCS
2008
ACM
13 years 11 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
ACMSE
2006
ACM
14 years 2 months ago
Framework design using function generalization: a binary tree traversal case study
A software framework is a technology that enables software reuse, potentially yielding rich dividends but requiring significant longterm investment. However, a framework is not a ...
H. Conrad Cunningham, Yi Liu, Pallavi Tadepalli
SAC
2006
ACM
14 years 2 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins