Sciweavers

131 search results - page 14 / 27
» Revocation Systems with Very Small Private Keys
Sort
View
CC
2005
Springer
124views System Software» more  CC 2005»
14 years 1 months ago
Boosting the Performance of Multimedia Applications Using SIMD Instructions
Modern processors’ multimedia extensions (MME) provide SIMD ISAs to boost the performance of typical operations in multimedia applications. However, automatic vectorization suppo...
Weihua Jiang, Chao Mei, Bo Huang, Jianhui Li, Jiah...
JOC
2007
133views more  JOC 2007»
13 years 7 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
INTETAIN
2009
Springer
14 years 2 months ago
Stay Tuned! An Automatic RSS Feeds Trans-coder
News aggregators are widely used to read RSS feeds but they require the user to be in front of a screen. While moving, people usually do not have any display, or very small ones. M...
Patrick Salamin, Alexandre Wetzel, Daniel Thalmann...
NA
2010
153views more  NA 2010»
13 years 6 months ago
Verified error bounds for multiple roots of systems of nonlinear equations
It is well known that it is an ill-posed problem to decide whether a function has a multiple root. Even for a univariate polynomial an arbitrary small perturbation of a polynomial ...
Siegfried M. Rump, Stef Graillat
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
14 years 1 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard