Sciweavers

700 search results - page 80 / 140
» et 2008
Sort
View
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
FSTTCS
2008
Springer
13 years 10 months ago
Average-Time Games
An average-time game is played on the infinite graph of configurations of a finite timed automaton. The two players, Min and Max, construct an infinite run of the automaton by ...
Marcin Jurdzinski, Ashutosh Trivedi
GG
2008
Springer
13 years 10 months ago
Labelled (Hyper)Graphs, Negotiations and the Naming Problem
We consider four different models of process interactions that unify and generalise models introduced and studied by Angluin et al. [AAD+ 04] and models introduced and studied by ...
Jérémie Chalopin, Antoni W. Mazurkie...
CORR
2008
Springer
82views Education» more  CORR 2008»
13 years 9 months ago
An Evaluation of a Structured Spreadsheet Development Methodology
This paper presents the results of an empirical evaluation of the quality of a structured methodology for the development of spreadsheet models, proposed in numerous previous pape...
Kamalasen Rajalingham, David Chadwick, Brian Knigh...
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 9 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong