Sciweavers

229 search results - page 33 / 46
» Roots of Square: Cryptanalysis of Double-Layer Square and Sq...
Sort
View
MIDDLEWARE
2005
Springer
14 years 1 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
MFCS
2004
Springer
14 years 1 months ago
The Bidimensional Theory of Bounded-Genus Graphs
Abstract. Bidimensionality provides a tool for developing subexponential fixed-parameter algorithms for combinatorial optimization problems on graph families that exclude a minor....
Erik D. Demaine, Mohammad Taghi Hajiaghayi, Dimitr...
MICCAI
2004
Springer
14 years 1 months ago
Bite-Block Relocation Error in Image-Guided Otologic Surgery
Otologic surgery is undertaken to treat ailments of the ear including persistent infections, hearing loss, vertigo, and cancer. Typically performed on healthy patients in outpatien...
J. Michael Fitzpatrick, Ramya Balachandran, Robert...
ARITH
2003
IEEE
14 years 1 months ago
The Interval Logarithmic Number System
This paper introduces the Interval Logarithmic Number System (ILNS), in which the Logarithmic Number System (LNS) is used as the underlying number system for interval arithmetic. ...
Mark G. Arnold, Jesus Garcia, Michael J. Schulte