Sciweavers

1143 search results - page 56 / 229
» pairing 2007
Sort
View
ISCAS
2007
IEEE
75views Hardware» more  ISCAS 2007»
14 years 4 months ago
State-Space Analysis of Power Complementary Analog Filters
Abstract— This paper presents a new analysis of power complementary analog filters using the state-space representation. Our analysis is based on the bounded-real Riccati equati...
Shunsuke Koshita, Masahide Abe, Masayuki Kawamata
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
14 years 4 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
14 years 4 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...
SPIRE
2007
Springer
14 years 4 months ago
A Fast and Compact Web Graph Representation
Compressed graphs representation has become an attractive research topic because of its applications to the manipulation of huge Web graphs in main memory. By far the best current ...
Francisco Claude, Gonzalo Navarro
ACMICEC
2007
ACM
134views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Vindictive bidding in keyword auctions
We study vindictive bidding, a strategic bidding behavior in keyword auctions where a bidder forces his competitor to pay more without affecting his own payment. We show that most...
Yunhong Zhou, Rajan M. Lukose