Sciweavers

1696 search results - page 12 / 340
» Permuted function matching
Sort
View
133
Voted
DCC
2011
IEEE
14 years 7 months ago
Notions and relations for RKA-secure permutation and function families
Jongsung Kim, Jaechul Sung, Ermaliza Razali, Rapha...
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 10 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 10 months ago
Digraph description of k-interchange technique for optimization over permutations and adaptive algorithm system
The paper describes a general glance to the use of element exchange techniques for optimization over permutations. A multi-level description of problems is proposed which is a fund...
Mark Sh. Levin
COCO
2004
Springer
118views Algorithms» more  COCO 2004»
15 years 9 months ago
Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go?
In decision tree models, considerable attention has been paid on the effect of symmetry on computational complexity. That is, for a permutation group Γ, how low can the complexit...
Xiaoming Sun, Andrew Chi-Chih Yao, Shengyu Zhang