Sciweavers

1898 search results - page 94 / 380
» Weak Keys for IDEA
Sort
View
CVPR
2004
IEEE
14 years 10 months ago
Learning Distance Functions for Image Retrieval
Image retrieval critically relies on the distance function used to compare a query image to images in the database. We suggest to learn such distance functions by training binary ...
Tomer Hertz, Aharon Bar-Hillel, Daphna Weinshall
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 9 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
PKC
2010
Springer
210views Cryptology» more  PKC 2010»
14 years 23 days ago
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem
Abstract. In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC’2009 [3]. This system is based on an unusual problem in multivariate cr...
Jean-Charles Faugère, Pierre-Jean Spaenleha...
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
14 years 7 days ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
TLT
2008
90views more  TLT 2008»
13 years 8 months ago
Group Scribbles to Support Knowledge Building in Jigsaw Method
The jigsaw method empowers students to build their own knowledge through successive engagement through interactions in original group discussions and in expert group discussions. H...
Chee-Kit Looi, Chiu-Pin Lin, Kuo-Ping Liu