Semantic Scholar uses AI to extract papers important to this topic.

2019

2019

- Marcel Armour, Bertram Poettering
- IACR Cryptology ePrint Archive
- 2019

This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning… Expand

Is this relevant?

2010

2010

- Kazuhiko Minematsu
- FSE
- 2010

The security of randomized message authentication code, MAC for short, is typically depending on the uniqueness of random initial… Expand

Is this relevant?

2005

2005

- Mpa Peter A. Gorski MD
- Maternal and Child Health Journal
- 2005

Biographies such as the one Wallis and Guyer published in this issue of the Journal serve to remind us that greatness germinates… Expand

Is this relevant?

2005

2005

General-Parallel Computing A Brief Introduction to Parallel Computing M. Paprzycki and P. Stpiczynski Parallel Computer… Expand

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- Serge Vaudenay
- Journal of Cryptology
- 2003

Abstract
Pseudorandomness is a classical model for the security of block ciphers.
In this paper we propose convenient tools in… Expand

Is this relevant?

2001

2001

- Bowen Alpern, Jong-Deok Choi, Ton Anh Ngo, Manu Sridharan, John M. Vlissides
- Proceedings 15th International Parallel and…
- 2001

Development of multithreaded applications is particularly tricky because of their non-deterministic execution behaviors. Tools… Expand

Is this relevant?

2001

2001

- Howard Barnum
- 2001

This paper has been withdrawn because of an error in the proof of Lemma 1. Without Lemma 1, the result of the main theorem (with… Expand

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- Yishay Mansour, Noam Nisan, Prasoon Tiwari
- Theor. Comput. Sci.
- 1993

Any implementation of Carter-Wegman universal hashing from n-bit strings to m-bit strings requires a time-space tradeoff of TS… Expand

Is this relevant?

1993

1993

- Hung T. Le, Edward J. Wegman
- Signal Processing
- 1993

In this paper, we give an optimal estimation procedure for the class of band-limited signals. Wegman (1984) suggested a… Expand

Is this relevant?

1989

1989

- Lance Fortnow
- 1989

In 1985, Goldwasser, Micali and Racko formulated interactive proof systems as a tool for developing cryptographic protocols… Expand

Is this relevant?

By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License

ACCEPT & CONTINUE