1
Pubblicazione 2010
Sommario: ... for the LeadingOnes Problem -- Mirrored Sampling and Sequential Selection for Evolution Strategies -- Optimisation...
Testo
Elettronico eBook
2
Pubblicazione 2005
Sommario: ... Optical Networks -- A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems...
Testo
Elettronico eBook
3
Pubblicazione 2010
Sommario: ... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...
Testo
Elettronico eBook
4
Pubblicazione 2010
Sommario: ... for the Parallel Solution of Symmetric Tridiagonal Eigenvalue Problems -- A Parallel Solution of Large-Scale Heat...
Testo
Elettronico eBook
5
Pubblicazione 2015
Sommario: ... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...
Testo
Elettronico eBook
6
Pubblicazione 2010
Sommario: ... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...
Testo
Elettronico eBook
7
Pubblicazione 2005
Sommario: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
Testo
Elettronico eBook
8
Pubblicazione 2006
Sommario: ... to Iterative Servers (Short Paper) -- An Independent Function-Parallel Firewall Architecture for High-Speed...
Testo
Elettronico eBook
9
Pubblicazione 2007
Sommario: ...Stream Ciphers -- An Analysis of the Hermes8 Stream Ciphers -- On the Security of the LILI Family...
Testo
Elettronico eBook
10
Pubblicazione 2012
Sommario: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...
Testo
Elettronico eBook
11
Pubblicazione 2013
Sommario: ... Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic...
Testo
Elettronico eBook
12
Pubblicazione 2013
Sommario: ...The Workshop on Usable Security (USEC 13) -- I Think, Therefore I Am: Usability and Security...
Testo
Elettronico eBook
13
Pubblicazione 2014
Sommario: ... Generators -- Open Problems on Binary Bent Functions -- On Semi-bent functions and Related Plateaued...
Testo
Elettronico eBook
14
Pubblicazione 2006
Sommario: ... Approximation of S-box Functions -- Random Generation of S-Boxes for Block Ciphers -- Problems of Sending...
Testo
Elettronico eBook
15
Pubblicazione 2015
Sommario: ... in a Decision Making Problem by Preference Relation -- RBHR: Region-Based Hybrid Routing Protocol...
Testo
Elettronico eBook
16
Pubblicazione 2005
Sommario: ... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...
Testo
Elettronico eBook
17
Sommario: ... -- Graphics, Multimedia, and Printing -- Database Access -- Networking -- Security and Cryptography...
Testo
Elettronico eBook
18
Pubblicazione 2010
Sommario: ... Function -- Symmetric Cryptography -- The Sum of CBC MACs Is a Secure PRF -- On Fast Verification of Hash...
Testo
Elettronico eBook
19
Pubblicazione 2014
Sommario: ... -- On the Fekete-Szegö Problem for Certain Subclass of Analytic Functions -- Bi-Objective Scheduling on Parallel...
Testo
Elettronico eBook
20
Pubblicazione 2010
Sommario: ... -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics...
Testo
Elettronico eBook