Parity of a permutation

Results: 103



#Item
1Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2014-11-18 10:03:56
2An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-05-26 20:18:15
3A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
4Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion  Aspects of Pairing Inversion

Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion Aspects of Pairing Inversion

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-08 07:01:02
5Which Kind of Module Should I Extract?? Ulrike Sattler1 , Thomas Schneider1 , and Michael Zakharyaschev2 1 University of Manchester, UK, {sattler,schneider}@cs.man.ac.uk 2

Which Kind of Module Should I Extract?? Ulrike Sattler1 , Thomas Schneider1 , and Michael Zakharyaschev2 1 University of Manchester, UK, {sattler,schneider}@cs.man.ac.uk 2

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2009-07-07 04:46:34
6Static conflict detection for a policy language∗ Alix Trieu1 , Robert Dockins2 , Andrew Tolmach3 1: ENS Rennes,  2: Galois, Inc.

Static conflict detection for a policy language∗ Alix Trieu1 , Robert Dockins2 , Andrew Tolmach3 1: ENS Rennes, 2: Galois, Inc.

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2014-12-15 05:39:41
7A type system for Continuation Calculus Herman Geuvers Radboud University Nijmegen, Technical University Eindhoven, the Netherlands

A type system for Continuation Calculus Herman Geuvers Radboud University Nijmegen, Technical University Eindhoven, the Netherlands

Add to Reading List

Source URL: www.cs.ru.nl

Language: English - Date: 2014-05-12 17:56:59
8Ontology-Based Data Access with Closed Predicates is Inherently Intractable (Sometimes) ˙ Carsten Lutz and Inanc ¸ Seylan Fachbereich Informatik

Ontology-Based Data Access with Closed Predicates is Inherently Intractable (Sometimes) ˙ Carsten Lutz and Inanc ¸ Seylan Fachbereich Informatik

Add to Reading List

Source URL: www.informatik.uni-bremen.de

Language: English - Date: 2013-07-31 11:04:35
9Relating Computational Effects by >>-Lifting Shin-ya Katsumata Research Institute for Mathematical Sciences Kyoto University, Kyoto, , Japan

Relating Computational Effects by >>-Lifting Shin-ya Katsumata Research Institute for Mathematical Sciences Kyoto University, Kyoto, , Japan

Add to Reading List

Source URL: www.kurims.kyoto-u.ac.jp

Language: English - Date: 2011-11-07 10:18:24
10A Theory of Skiplists with Applications to the Verification of Concurrent Datatypes? Alejandro S´anchez1 and C´esar S´anchez1,2 1  2

A Theory of Skiplists with Applications to the Verification of Concurrent Datatypes? Alejandro S´anchez1 and C´esar S´anchez1,2 1 2

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-06-27 10:56:07