Sciweavers

1898 search results - page 102 / 380
» Weak Keys for IDEA
Sort
View
EUROPAR
1999
Springer
14 years 1 months ago
Consequences of Modern Hardware Design for Numerical Simulations and Their Realization in FEAST
This paper deals with the influence of hardware aspects of modern computer architectures to the design of software for numerical simulations. We present performance tests for vari...
Christian Becker, Susanne Kilian, Stefan Turek
PKC
1998
Springer
134views Cryptology» more  PKC 1998»
14 years 1 months ago
How (not) to Design RSA Signature Schemes
The concept of public-key cryptography was invented in 1976 by Diffie and Hellman [DH]. The following year, Rivest, Shamir and Adleman provided an implementation of this idea [RSA]...
Jean-François Misarsky
COMPGEOM
1994
ACM
14 years 29 days ago
Computing Many Faces in Arrangements of Lines and Segments
We present randomized algorithms for computing many faces in an arrangement of lines or of segments in the plane, which are considerably simpler and slightly faster than the previo...
Pankaj K. Agarwal, Jirí Matousek, Otfried S...
APWEB
2006
Springer
14 years 16 days ago
Connecting Sensor Networks with TCP/IP Network
Wireless sensor networks cannot have meaningful work without connecting with TCP/IP based network. In this paper, we analyze and compare all the existing solutions for connecting s...
Shu Lei, Jin Wang, Hui Xu, Jinsung Cho, Sungyoung ...
QOFIS
2000
Springer
14 years 12 days ago
A Queue Management System for Differentiated-Services IP Routers
Packet scheduling and queue management strategies are key issues of DiffServ per-hop behaviours. This paper proposes a queue management system that, in conjunction with scheduling ...
Gonçalo Quadros, Antonio Alves, João...