In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...
Tool path generation is one of the most complex problems in Computer Aided Manufacturing. Although some efficient strategies have been developed, most of them are only useful for s...
In this paper we introduce a framework for instrumenting (“rigging”) characters that are modeled as dynamic elastic bodies, so that their shapes can be controlled by an animat...
Steve Capell, Matthew Burkhart, Brian Curless, Tom...