Sciweavers

8555 search results - page 1693 / 1711
» Property Based Coordination
Sort
View
LATINCRYPT
2010
13 years 6 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
LATINCRYPT
2010
13 years 6 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
PVLDB
2010
163views more  PVLDB 2010»
13 years 6 months ago
Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight
Microsoft SQL Server spatial libraries contain several components that handle geometrical and geographical data types. With advances in geo-sensing technologies, there has been an...
Seyed Jalal Kazemitabar, Ugur Demiryurek, Mohamed ...
SCN
2010
Springer
176views Communications» more  SCN 2010»
13 years 6 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi
SIGPRO
2010
122views more  SIGPRO 2010»
13 years 6 months ago
Parameter estimation for exponential sums by approximate Prony method
The recovery of signal parameters from noisy sampled data is a fundamental problem in digital signal processing. In this paper, we consider the following spectral analysis problem...
Daniel Potts, Manfred Tasche
« Prev « First page 1693 / 1711 Last » Next »