Sciweavers

281 search results - page 22 / 57
» Primitive words and roots of words
Sort
View
INTERACT
2003
13 years 9 months ago
The New Text and Graphical Input Device: Compact Biometrical Data Acquisition
Abstract: Development of new text and graphical input devices is considered to be important part of humancomputer interaction by many researchers worldwide. Our paper presents our ...
Pen Ondrej Rohlik, Pavel Mautner, Václav Ma...
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
13 years 8 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
IPL
2006
118views more  IPL 2006»
13 years 7 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
MSCS
2006
100views more  MSCS 2006»
13 years 7 months ago
Modified bar recursion
Modified bar recursion has been used to give a realizability interpretation of the classical axioms of countable and dependent choice. In this paper we survey the main results con...
Ulrich Berger, Paulo Oliva
JUCS
2007
120views more  JUCS 2007»
13 years 7 months ago
Compile-time Computation of Polytime Functions
: We investigate the computational power of C++ compilers. In particular, it is known that any partial recursive function can be computed at compile time, using the template mechan...
Emanuele Covino, Giovanni Pani, Daniele Scrimieri