Sciweavers

700 search results - page 80 / 140
» et 2008
Sort
View
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
107
Voted
FSTTCS
2008
Springer
15 years 4 months ago
Average-Time Games
An average-time game is played on the infinite graph of configurations of a finite timed automaton. The two players, Min and Max, construct an infinite run of the automaton by ...
Marcin Jurdzinski, Ashutosh Trivedi
GG
2008
Springer
15 years 4 months ago
Labelled (Hyper)Graphs, Negotiations and the Naming Problem
We consider four different models of process interactions that unify and generalise models introduced and studied by Angluin et al. [AAD+ 04] and models introduced and studied by ...
Jérémie Chalopin, Antoni W. Mazurkie...
CORR
2008
Springer
82views Education» more  CORR 2008»
15 years 3 months ago
An Evaluation of a Structured Spreadsheet Development Methodology
This paper presents the results of an empirical evaluation of the quality of a structured methodology for the development of spreadsheet models, proposed in numerous previous pape...
Kamalasen Rajalingham, David Chadwick, Brian Knigh...
CORR
2008
Springer
141views Education» more  CORR 2008»
15 years 3 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong