Sciweavers

429 search results - page 13 / 86
» Permutative Additives and Exponentials
Sort
View
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
13 years 9 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
CORR
2008
Springer
100views Education» more  CORR 2008»
13 years 7 months ago
Statistical region-based active contours with exponential family observations
In this paper, we focus on statistical region-based active contour models where image features (e.g. intensity) are random variables whose distribution belongs to some parametric ...
François Lecellier, Stéphanie Jehan-...
EMNLP
2009
13 years 5 months ago
Sinuhe - Statistical Machine Translation using a Globally Trained Conditional Exponential Family Translation Model
We present a new phrase-based conditional exponential family translation model for statistical machine translation. The model operates on a feature representation in which sentenc...
Matti Kääriäinen
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 7 months ago
Bin Packing via Discrepancy of Permutations
A well studied special case of bin packing is the 3-partition problem, where n items of size > 1 4 have to be packed in a minimum number of bins of capacity one. The famous Kar...
Friedrich Eisenbrand, Dömötör P&aac...
ASIACRYPT
2001
Springer
14 years 3 days ago
How to Achieve a McEliece-Based Digital Signature Scheme
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. I...
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendri...