Sciweavers

658 search results - page 117 / 132
» The Grindahl Hash Functions
Sort
View
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
14 years 3 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta
GLOBECOM
2008
IEEE
14 years 2 months ago
Cross-Layer Error Control Optimization in WiMAX
—WiMAX is one of the most promising emerging broadband wireless technologies. As a consequence, data transfer performance optimization represents a crucial issue due to TCP limit...
Dzmitry Kliazovich, Tommaso Beniero, Sergio Dalsas...
FOCS
2007
IEEE
14 years 2 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
GLOBECOM
2007
IEEE
14 years 2 months ago
A Scalable Bloom Filter for Membership Queries
—Bloom filters allow membership queries over sets with allowable errors. It is widely used in databases, networks and distributed systems and it has great potential for distribut...
Kun Xie, Yinghua Min, Dafang Zhang, Jigang Wen, Ga...
ICIP
2007
IEEE
14 years 2 months ago
Rate-Distortion Analysis and Bit Allocation Strategy for Motion Estimation at the Decoder using Maximum Likelihood Technique in
Numerous approaches for distributed video coding have been recently proposed. One of main motivations for these techniques is the possibility of achieving complexity tradeoffs bet...
Ivy H. Tseng, Antonio Ortega