Sciweavers

271 search results - page 18 / 55
» The lattice of embedded subsets
Sort
View
IJAC
2002
128views more  IJAC 2002»
13 years 8 months ago
Computational Complexity of Generators and Nongenerators in Algebra
Abstract. We discuss the computational complexity of several problems concerning subsets of an algebraic structure that generate the structure. We show that the problem of determin...
Clifford Bergman, Giora Slutzki
CALC
2001
Springer
171views Cryptology» more  CALC 2001»
14 years 1 months ago
Approximate Integer Common Divisors
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually apply in the more general setting of (partially) approximate common divisors. This leads us t...
Nick Howgrave-Graham
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 10 months ago
Cryptanalysis of LASH
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7) ....
Ron Steinfeld, Scott Contini, Krystian Matusiewicz...
COMBINATORICS
1999
90views more  COMBINATORICS 1999»
13 years 8 months ago
New Bounds for Codes Identifying Vertices in Graphs
Let G = (V, E) be an undirected graph. Let C be a subset of vertices that we shall call a code. For any vertex v V , the neighbouring set N(v, C) is the set of vertices of C at d...
Gérard D. Cohen, Iiro S. Honkala, Antoine L...
FSS
2010
107views more  FSS 2010»
13 years 7 months ago
Cut approach to islands in rectangular fuzzy relations
The paper investigates fuzzy relations on a finite domain in the cutworthy framework, dealing with a new property coming from the information theory. If the domain of a relation i...
Eszter K. Horváth, Branimir Seselja, Andrej...