Sciweavers

27692 search results - page 189 / 5539
» Where is ...
Sort
View
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
14 years 4 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
ECAL
2007
Springer
14 years 4 months ago
Emergence of Genetic Coding: An Information-Theoretic Model
This paper1 introduces a simple model for evolutionary dynamics approaching the “coding threshold”, where the capacity to symbolically represent nucleic acid sequences emerges ...
Piraveenan Mahendra, Daniel Polani, Mikhail Prokop...
ESA
2007
Springer
100views Algorithms» more  ESA 2007»
14 years 4 months ago
Nash Equilibria in Voronoi Games on Graphs
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices (customers) are then assigned to closest facilities and...
Christoph Dürr, Nguyen Kim Thang
EUROPAR
2007
Springer
14 years 4 months ago
Periodic Load Balancing on the N -Cycle: Analytical and Experimental Evaluation
Abstract. We investigate the following very simple load-balancing algorithm on the N-cycle (N even) which we call Odd-Even Transposition Balancing (OETB). The edges of the cycle ar...
Christian Rieß, Rolf Wanka
FSE
2007
Springer
105views Cryptology» more  FSE 2007»
14 years 4 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima