This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
We define a new decidable logic for expressing and checking invariants of programs that manipulate dynamically-allocated objects via pointers and destructive pointer updates. The ...
Greta Yorsh, Alexander Moshe Rabinovich, Mooly Sag...
- The use of computational methods for solving partial differential equations in the field of Heat Transfer is crucial. However, the actual user friendly commercial applications, f...
Let p be a prime and let E(IFp) be an elliptic curve defined over the finite field IFp of p elements. For a given point G E(IFp) the linear congruential genarator on elliptic curv...
The estimation of soft tissue deformation from 3D image sequences is an important problem in a number of fields such as diagnosis of heart disease and image guided surgery. In thi...
Xenophon Papademetris, Pengcheng Shi, Donald P. Di...