Results 271 to 280 of about 250,620 (292)
Some of the next articles are maybe not open access.

Constructing Compression Functions

2021
We have seen that cryptographic hash functions that can process arbitrarily long inputs can be built from fixed-input-length compression functions via the Merkle–Damgard transformation (Chapter 13).
Arno Mittelbach, Marc Fischlin
openaire   +1 more source

Engineering Compressed Static Functions

2018 Data Compression Conference, 2018
Recent advances in the compact representation of static functions (with constant access time) have made it possible to fully exploit constructions based on random linear system. Such constructions, albeit theoretically appealing, were previously too slow to be usable.
Genuzio, Marco, Vigna, Sebastiano
openaire   +1 more source

Building indifferentiable compression functions from the PGV compression functions

Designs, Codes and Cryptography, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gauravaram, Praveen   +2 more
openaire   +3 more sources

Functional programs as compressed data

Higher-Order and Symbolic Computation, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kobayashi, Naoki   +3 more
openaire   +3 more sources

Gabor function-based medical image compression

Image and Vision Computing, 1995
Compression methods based on Gabor functions are implemented for simulated nuclear medicine liver images with and without lesions. The performance of the compression schemes is assessed objectively by comparing the original images to the compressed/reconstructed images through calculation of the Hotelling trace, an index that has been shown to ...
M P Anderson, M H Loew, D G Brown
openaire   +1 more source

Cryptanalysis of MAME compression function

2010 International Conference On Computer Design and Applications, 2010
MAME is a compression function designed for hardware-oriented hash functions which can be used in applications with reduced hardware requirements and was described in CHES 2007. This paper first gives the 22, 23, 24 rounds attacks using the cryptanalysis on generalized Feistel.
null Yu Xue, null Wenling Wu
openaire   +1 more source

On Distributed Compression of Linear Functions

IEEE Transactions on Information Theory, 2008
We consider distributed compression of a pair of Gaussian sources in which the goal is to reproduce a linear function of the sources at the decoder. It has recently been noted that lattice codes can provide improved compression rates for this problem compared to conventional, unstructured codes.
openaire   +1 more source

Aggregation Rate for Compressible Functions

Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017
One of the most fundamental tasks in sensor networks is the computation of a (compressible) aggregation function of the input measurements. What rate of computation can be maintained, by properly choosing the aggregation tree, the TDMA schedule of the tree edges, and the transmission powers? We show here that the optimal rate is effectively a constant.
Magnús M. Halldórsson, Tigran Tonoyan
openaire   +1 more source

Compressively sampling the plenacoustic function

SPIE Proceedings, 2011
Directly measuring the full set of acoustic impulse responses within a room would require an unreasonably large number of measurements. Considering that the acoustic wavefield is sparse in some dictionaries, Compressed Sensing allows the recovery of the full wavefield with a reduced set of measurements, but raises challenging computational and memory
Mignot, R., Chardon, G., Daudet, L.
openaire   +2 more sources

Home - About - Disclaimer - Privacy