Sciweavers

156 search results - page 11 / 32
» On the Round Complexity of Covert Computation
Sort
View
EUROCRYPT
2004
Springer
14 years 24 days ago
On the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational com...
Yuval Ishai, Eyal Kushilevitz
ASIACRYPT
2011
Springer
12 years 7 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...
ASAP
2005
IEEE
99views Hardware» more  ASAP 2005»
14 years 1 months ago
Variable Radix Real and Complex Digit-Recurrence Division
We propose a digit-recurrence algorithm for division in real and complex number domains using a variable radix. The objective of the approach is to simplify the prescaling of the ...
Milos D. Ercegovac, Jean-Michel Muller
IPPS
1998
IEEE
13 years 11 months ago
A Development Tool Environment for Configuration, Build, and Launch of Complex Applications
The increasing size and complexity of high-performance applications have motivated a new round of innovation related to configuration, build, and launch of applications for large ...
Mike Krueger
ICALP
2003
Springer
14 years 19 days ago
A Direct Sum Theorem in Communication Complexity via Message Compression
We prove lower bounds for the direct sum problem for two-party bounded error randomised multipleround communication protocols. Our proofs use the notion of information cost of a p...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen