Sciweavers

28 search results - page 5 / 6
» Rotation symmetric Boolean functions - Count and cryptograph...
Sort
View
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
14 years 21 days ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
ICPR
2008
IEEE
14 years 10 months ago
Bilateral symmetry of object silhouettes under perspective projection
Symmetry is an important property of objects and is exhibited in different forms e.g., bilateral, rotational, etc. This paper presents an algorithm for computing the bilateral sym...
Cornelia Fermüller, Hyoungjune Yi, Konstantin...
FOCS
2009
IEEE
13 years 6 months ago
Learning and Smoothed Analysis
We give a new model of learning motivated by smoothed analysis (Spielman and Teng, 2001). In this model, we analyze two new algorithms, for PAC-learning DNFs and agnostically learn...
Adam Tauman Kalai, Alex Samorodnitsky, Shang-Hua T...
WCE
2007
13 years 10 months ago
Further Improvement of Super-Resolution Reconstruction
— We propose a novel approach to improve further the quality of recovered images from standard super-resolution reconstruction, using Lewitt’s Kaiser-Bessel window functions (b...
Edward Y. T. Ho, Andrew Todd-Pokropek