Sciweavers

290 search results - page 24 / 58
» Pseudorandom Bits for Polynomials
Sort
View
DSN
2006
IEEE
14 years 5 days ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May
WINE
2010
Springer
135views Economy» more  WINE 2010»
13 years 6 months ago
Market Communication in Production Economies
We study the information content of equilibrium prices using the market communication model of Deng, Papadimitriou, and Safra [4]. We show that, in the worst case, communicating an...
Christopher A. Wilkens
ARITH
2003
IEEE
14 years 1 months ago
"Partially Rounded" Small-Order Approximations for Accurate, Hardware-Oriented, Table-Based Methods
We aim at evaluating elementary and special functions using small tables and small, rectangular, multipliers. To do that, we show how accurate polynomial approximations whose orde...
Jean-Michel Muller
FOCS
1992
IEEE
14 years 18 days ago
Probabilistic Checking of Proofs; A New Characterization of NP
We give a new characterization of NP: the class NP contains exactly those languages L for which membership proofs (a proof that an input x is in L) can be verified probabilisticall...
Sanjeev Arora, Shmuel Safra