Sciweavers

1898 search results - page 102 / 380
» Weak Keys for IDEA
Sort
View
EUROPAR
1999
Springer
15 years 8 months ago
Consequences of Modern Hardware Design for Numerical Simulations and Their Realization in FEAST
This paper deals with the influence of hardware aspects of modern computer architectures to the design of software for numerical simulations. We present performance tests for vari...
Christian Becker, Susanne Kilian, Stefan Turek
153
Voted
PKC
1998
Springer
134views Cryptology» more  PKC 1998»
15 years 7 months ago
How (not) to Design RSA Signature Schemes
The concept of public-key cryptography was invented in 1976 by Diffie and Hellman [DH]. The following year, Rivest, Shamir and Adleman provided an implementation of this idea [RSA]...
Jean-François Misarsky
138
Voted
COMPGEOM
1994
ACM
15 years 7 months ago
Computing Many Faces in Arrangements of Lines and Segments
We present randomized algorithms for computing many faces in an arrangement of lines or of segments in the plane, which are considerably simpler and slightly faster than the previo...
Pankaj K. Agarwal, Jirí Matousek, Otfried S...
139
Voted
APWEB
2006
Springer
15 years 7 months ago
Connecting Sensor Networks with TCP/IP Network
Wireless sensor networks cannot have meaningful work without connecting with TCP/IP based network. In this paper, we analyze and compare all the existing solutions for connecting s...
Shu Lei, Jin Wang, Hui Xu, Jinsung Cho, Sungyoung ...
111
Voted
QOFIS
2000
Springer
15 years 7 months ago
A Queue Management System for Differentiated-Services IP Routers
Packet scheduling and queue management strategies are key issues of DiffServ per-hop behaviours. This paper proposes a queue management system that, in conjunction with scheduling ...
Gonçalo Quadros, Antonio Alves, João...