Sciweavers

229 search results - page 12 / 46
» Roots of Square: Cryptanalysis of Double-Layer Square and Sq...
Sort
View
ICISC
1998
87views Cryptology» more  ICISC 1998»
13 years 10 months ago
Rabin and RSA analogues based on non-maximal imaginary quadratic orders
Abstract. In 14] and 21] there are proposed ElGamal-type cryptosystems based on non-maximal imaginary quadratic orders with fast trapdoor decryption. The trapdoor information is th...
Detlef Hühnlein, Andreas Meyer, Tsuyoshi Taka...
TABLEAUX
2000
Springer
14 years 16 days ago
Matrix-Based Inductive Theorem Proving
We present an approach to inductive theorem proving that integrates rippling-based rewriting into matrix-based logical proof search. The selection of appropriate connections in a m...
Christoph Kreitz, Brigitte Pientka
TVCG
2012
184views Hardware» more  TVCG 2012»
11 years 11 months ago
Spherical DCB-Spline Surfaces with Hierarchical and Adaptive Knot Insertion
—This paper develops a novel surface fitting scheme for automatically reconstructing a genus-0 object into a continuous parametric spline surface. A key contribution for making ...
Juan Cao, Xin Li, Zhonggui Chen, Hong Qin
COMBINATORICS
1998
93views more  COMBINATORICS 1998»
13 years 8 months ago
Durfee Polynomials
Let F(n) be a family of partitions of n and let F(n d) denote the set of partitions in F(n) with Durfee square of size d. We de ne the Durfee polynomial of F(n) to be the polynomi...
E. Rodney Canfield, Sylvie Corteel, Carla D. Savag...
MANSCI
2010
108views more  MANSCI 2010»
13 years 3 months ago
Capacity Sizing Under Parameter Uncertainty: Safety Staffing Principles Revisited
We study a capacity sizing problem in a service system that is modeled as a single-class queue with multiple servers and where customers may renege while waiting for service. A sa...
Achal Bassamboo, Ramandeep S. Randhawa, Assaf J. Z...