Sciweavers

2303 search results - page 40 / 461
» The Cryptographic Abstract Machine
Sort
View
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
15 years 6 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
PKC
2010
Springer
130views Cryptology» more  PKC 2010»
15 years 6 months ago
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Abstract. This paper describes an extremely efficient squaring operation in the so-called ‘cyclotomic subgroup’ of F× q6 , for q ≡ 1 mod 6. This result arises from consideri...
Robert Granger, Michael Scott
89
Voted
CJ
2002
70views more  CJ 2002»
15 years 2 months ago
Formal Methods for Assuring Security of Protocols
l examination of the underlying assumptions, abstractions, and possible actions. Consequently, assuring that a system behaves securely is virtually impossible without the use of ri...
Susan Older, Shiu-Kai Chin
81
Voted
ICML
2004
IEEE
16 years 3 months ago
Dynamic abstraction in reinforcement learning via clustering
Abstraction in Reinforcement Learning via Clustering Shie Mannor shie@mit.edu Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Cambridge, MA ...
Shie Mannor, Ishai Menache, Amit Hoze, Uri Klein
UC
2009
Springer
15 years 9 months ago
Abstract Geometrical Computation and Computable Analysis
Geometrical Computation and Computable Analysis J´erˆome Durand-Lose⋆ Laboratoire d’Informatique Fondamentale d’Orl´eans, Universit´e d’Orl´eans, B.P. 6759, F-45067 OR...
Jérôme Durand-Lose