Sciweavers

1225 search results - page 76 / 245
» The Instance Complexity Conjecture
Sort
View
INDOCRYPT
2007
Springer
14 years 3 months ago
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py...
Gautham Sekar, Souradyuti Paul, Bart Preneel
ANCS
2006
ACM
14 years 3 months ago
Sequence-preserving adaptive load balancers
Load balancing in packet-switched networks is a task of ever-growing importance. Network traffic properties, such as the Zipf-like flow length distribution and bursty transmissio...
Weiguang Shi, Lukas Kencl
INLG
2004
Springer
14 years 2 months ago
Reining in CCG Chart Realization
Abstract. We present a novel ensemble of six methods for improving the efficiency of chart realization. The methods are couched in the framework of Combinatory Categorial Grammar (...
Michael White
IEEEICCI
2002
IEEE
14 years 2 months ago
An Interaction-Based Approach for Structuring Coordination Activities
In this contribution we present a theoretical approach which has been utilized to inform the coordination of the development of complex systems. Coordination is regarded as a form...
Lars Taxén
CHES
2001
Springer
130views Cryptology» more  CHES 2001»
14 years 1 months ago
Generating Elliptic Curves of Prime Order
A variation of the Complex Multiplication (CM) method for generating elliptic curves of known order over finite fields is proposed. We give heuristics and timing statistics in th...
Erkay Savas, Thomas A. Schmidt, Çetin Kaya ...