Sciweavers

217 search results - page 21 / 44
» Selecting Cryptographic Key Sizes
Sort
View
JSS
2010
136views more  JSS 2010»
13 years 2 months ago
Automated diagnosis of feature model configurations
Software product-lines (SPLs) are software architectures that can be readily reconfigured for different project requirements. A key part of an SPL is a model that captures the rul...
Jules White, David Benavides, Douglas C. Schmidt, ...
SIGMOD
2006
ACM
137views Database» more  SIGMOD 2006»
14 years 8 months ago
Optimal multi-scale patterns in time series streams
We introduce a method to discover optimal local patterns, which concisely describe the main trends in a time series. Our approach examines the time series at multiple time scales ...
Spiros Papadimitriou, Philip S. Yu
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
12 years 11 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 2 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
CVPR
2009
IEEE
15 years 3 months ago
Learning query-dependent prefilters for scalable image retrieval
We describe an algorithm for similar-image search which is designed to be efficient for extremely large collections of images. For each query, a small response set is selected by...
Lorenzo Torresani (Dartmouth College), Martin Szum...