Sciweavers

429 search results - page 25 / 86
» Permutative Additives and Exponentials
Sort
View
ASIACRYPT
2000
Springer
14 years 2 days ago
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Abstract. We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the ...
Anand Desai, Sara K. Miner
CATS
2008
13 years 9 months ago
Generating Balanced Parentheses and Binary Trees by Prefix Shifts
We show that the set Bn of balanced parenthesis strings with n left and n right parentheses can be generated by prefix shifts. If b1, b2, . . . , b2n is a member of Bn, then the k...
Frank Ruskey, Aaron Williams
IPL
2006
80views more  IPL 2006»
13 years 7 months ago
BubbleSearch: A simple heuristic for improving priority-based greedy algorithms
We introduce BubbleSearch, a general approach for extending priority-based greedy heuristics. Following the framework recently developed by Borodin et al., we consider priority al...
Neal Lesh, Michael Mitzenmacher
TASLP
2002
142views more  TASLP 2002»
13 years 7 months ago
Geometric source separation: merging convolutive source separation with geometric beamforming
Convolutive blind source separation and adaptive beamforming have a similar goal--extracting a source of interest (or multiple sources) while reducing undesired interferences. A be...
Lucas C. Parra, Christopher V. Alvino
IPL
2010
107views more  IPL 2010»
13 years 6 months ago
Collisions for variants of the BLAKE hash function
In this paper we present an attack to the BLOKE and BRAKE hash functions, which are weakened versions of the SHA-3 candidate BLAKE. In difference to BLAKE, the BLOKE hash functio...
Janos Vidali, Peter Nose, Enes Pasalic