Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
56 | Oded Goldreich 0001 |
On the Number of Close-and-Equal Pairs of Bits in a String. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
the RSA Scheme, Bit Security, Combinatorial Bounds, Bit-String Properties, Cryptography, Public Key Cryptosystems, Combinatorial Analysis |
40 | Qianli Zhang, Jilong Wang 0001, Xing Li 0001 |
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Candelaria Hernández-Goya, Amparo Fúster-Sabater |
Deterministic Analysis of Balancedness in Symmetric Cryptography. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, Confidentiality, balancedness |
32 | Amparo Fúster-Sabater, Pino Caballero-Gil |
A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, stream cipher, Confidentiality |
32 | Gerard Ellis, Fritz Lehmann |
Exploiting the Induced Order on Type-Labeled Graphs for Fast Knowledge Retrieval. |
ICCS |
1994 |
DBLP DOI BibTeX RDF |
type lattice, bit string, skeleton product, fret product, order theory, information retrieval, encoding, knowledge base, deductive database, conceptual graphs, poset, graph database, subsumption, subgraph isomorphism |
30 | Lee D. McFearin, David W. Matula |
Generation and Analysis of Hard to Round Cases for Binary Floating Point Division. |
IEEE Symposium on Computer Arithmetic |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Peter Bro Miltersen |
Lower bounds on the size of selection and rank indexes. |
SODA |
2005 |
DBLP BibTeX RDF |
|
29 | Pedro García-Mochales, Amparo Fúster-Sabater |
Efficient Computation of Balancedness in Binary Sequence Generators. |
SPIRE |
2004 |
DBLP DOI BibTeX RDF |
bit-string algorithm, Balancedness, computational logics |
27 | Hugo de Garis, Jonathan Dinerstein, Ravichandra Sriram |
Reversible Evolvable Networks: A Reversible Evolvable Boolean Network Architecture and Methodology to Overcome the Heat Generation Problem in Molecular Scale Brain Building. |
Evolvable Hardware |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Jae-Jin Lee, Gi-Yong Song |
Bit-level super-systolic array for FIR filter with a FPGA-based bit-serial semi-systolic multiplier. |
FPGA |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Michael Luby, Charles Rackoff |
A Study of Password Security. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
23 | Christian Cachin, Ueli M. Maurer |
Linking Information Reconciliation and Privacy Amplification (Extended Abstract). |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
22 | René J. van der Vleuten, Richard P. Kleihorst |
Low-Complexity Scalable Image Compression. |
Data Compression Conference |
2000 |
DBLP DOI BibTeX RDF |
VLSI, embedded, image-coding, DCT, CMOS, JPEG, progressive |
21 | Stefan Droste |
Analysis of the (1+1) EA for a Dynamically Bitwise Changing OneMax. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
21 | James R. Parker |
Genetic Algorithms for Continuous Problems. |
AI |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Amparo Fúster-Sabater, Pino Caballero-Gil, Oscar Delgado-Mohatar |
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application. |
ICCS (1) |
2009 |
DBLP DOI BibTeX RDF |
bit-string, run dirtribution, cryptography, Pseudorandomness, balancedness |
21 | Mario A. Nascimento, Vishal Chitkara |
Color-based image retrieval using binary signatures. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
bit-string signatures, color-based image retrieval, image databases, CBIR, color histograms |
21 | Aravind Srinivasan, David Zuckerman |
Computing with Very Weak Random Sources |
FOCS |
1994 |
DBLP DOI BibTeX RDF |
randomness-efficient Leftover Hash Lemma, very weak random sources, RP algorithms simulation, R-bit string, BPP simulations, Chor-Goldreich sources, expander constructions, probability, hardness, time-space tradeoffs, min-entropy |
21 | Ching-Tien Ho |
An Observation on the Bisectional Interconnection Networks. |
IEEE Trans. Computers |
1992 |
DBLP DOI BibTeX RDF |
bisectional interconnection networks, n-dimensional folded hypercube, bitwise Exclusive-OR, predefined bit string patterns, observation, hypercube networks, Hamming distance, isomorphism, binary matrix |
21 | David Zuckerman |
Simulating BPP Using a General Weak Random Source |
FOCS |
1991 |
DBLP DOI BibTeX RDF |
probe search, BPP simulation, general weak random source, R-bit string, approximation algorithms, polynomial time, maximum clique, weak random source |
21 | Oded Goldreich 0001, Hugo Krawczyk, Michael Luby |
On the Existence of Pseudorandom Generators (Extended Abstract) |
FOCS |
1988 |
DBLP DOI BibTeX RDF |
pseudorandom generators existence, regular functions, k-bit string, decoding, one-way functions, linear codes |
19 | Darko Dimitrov, Tomás Dvorák, Petr Gregor, Riste Skrekovski |
Gray Code Compression. |
IWOCA |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Awrangjeb, Mohan S. Kankanhalli |
Lossless Watermarking Considering the Human Visual System. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Claude Crépeau, Joe Kilian, George Savvides |
Interactive Hashing: An Information Theoretic Tool (Invited Talk). |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Michael E. Saks, Aravind Srinivasan, Shiyu Zhou |
Explicit OR-Dispersers with Polylogarithmic Degree. |
J. ACM |
1998 |
DBLP DOI BibTeX RDF |
hashing lemmas, imperfect sources of randomness, measures of information, hardness of approximation, derandomization, expander graphs, time-space tradeoffs, pseudo-random generators, explicit constructions, randomized computation |
18 | Ueli M. Maurer, Stefan Wolf 0001 |
Privacy Amplification Secure Against Active Adversaries. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement |
16 | Khuram Shahzad, Omar Usman Khan |
A Generalized Space-Efficient Algorithm for Quantum Bit String Comparators. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Masahito Hayashi |
Secure List Decoding and its Application to Bit-String Commitment. |
IEEE Trans. Inf. Theory |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Joana Passinhas, Tanya Araújo |
Gender-based occupational segregation: a bit string approach. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
16 | Masahito Hayashi |
Secure list decoding and its application to bit-string commitment. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
16 | Omar Reyad, Kadry Hamed, Mohamed Esmail Karar |
Hash-enhanced elliptic curve bit-string generator for medical image encryption. |
J. Intell. Fuzzy Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Jun Beom Kho, Andrew Beng Jin Teoh, Wonjune Lee, Jaihie Kim |
Bit-string representation of a fingerprint image by normalized local structures. |
Pattern Recognit. |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Yuxing Li, Heng Zhao 0001, Zhicheng X. Cao, Eryun Liu, Liaojun Pang |
Ordered and fixed-length bit-string fingerprint representation with minutia vicinity combined feature and spectral clustering. |
IET Image Process. |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Mariana Gama, Paulo Mateus, André Souto |
A Private Quantum Bit String Commitment. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
16 | Mariana Gama, Paulo Mateus, André Souto |
A Private Quantum Bit String Commitment. |
Entropy |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Jun Beom Kho, Andrew Beng Jin Teoh, Wonjune Lee, Jaihie Kim |
Fixed-length Bit-string Representation of Fingerprint by Normalized Local Structures. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
16 | Aki Harada, Yasushi Yamazaki, Tetsushi Ohki |
Biometric Bit String Generation for Smart-Phones Using Voice Data. |
APSIPA |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Eric Medvet, Alberto Bartoli, Andrea De Lorenzo |
Exploring the application of GOMEA to bit-string GE. |
GECCO (Companion) |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Yi Yu 0009, Gaoxi Xiao |
Preliminary Study on Bit-String Modelling of Opinion Formation in Complex Networks. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
16 | Bernadette Faye |
Extracting a uniform random bit-string over Jacobian of Hyperelliptic curves of Genus 2. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
16 | Hafiz Md. Hasan Babu, Lafifa Jamal, Sayanton Vhaduri Dibbo, Ashis Kumer Biswas |
Area and Delay Efficient Design of a Quantum Bit String Comparator. |
ISVLSI |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Ryo Yamagami, Yasushi Yamazaki |
Biometric Bit String Generation from Handwritten Initials on Smart Phones. |
CANDAR |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Wei Jing Wong, Andrew Beng Jin Teoh, Yau Hee Kho, Mou Ling Dennis Wong |
Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. |
Pattern Recognit. |
2016 |
DBLP DOI BibTeX RDF |
|
16 | Taiki Sowa, Suguru Sunada, Yasushi Yamazaki, Takeru Miyazaki |
Biometric Bit String Generation from Handwritten Signatures on Smart Device. |
CANDAR |
2016 |
DBLP DOI BibTeX RDF |
|
16 | Jan A. Bergstra, Cornelis A. Middelburg |
On Algorithmic Equivalence of Instruction Sequences for Computing Bit String Functions. |
Fundam. Informaticae |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Bin Zhou, Shudao Zhang, Deng-Yi Zhang, JiaHao Tan |
A Bit String Content Aware Chunking Strategy for Reduced CPU Energy on Cloud Storage. |
J. Electr. Comput. Eng. |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Marjan Ghazvininejad, Kevin Knight |
How to Memorize a Random 60-Bit String. |
HLT-NAACL |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Jan A. Bergstra, Cornelis A. Middelburg |
On algorithmic equivalence of instruction sequences for computing bit string functions. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
16 | Wei Jing Wong, M. L. Dennis Wong, Yau Hee Kho, Andrew Beng Jin Teoh |
Minutiae set to bit-string conversion using multi-scale bag-of-words paradigm. |
WIFS |
2014 |
DBLP DOI BibTeX RDF |
|
16 | Ke Zhang, Jacqueline M. Hughes-Oliver, S. Stanley Young |
Analysis of High-Dimensional Structure-Activity Screening Datasets Using the Optimal Bit String Tree. |
Technometrics |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Connie Tee |
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. |
Expert Syst. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat |
A Compact Bit String Accessibility Map for Secure XML Query Processing. |
ANT/MobiWIS |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Jing Ju, Jim Plusquellic, Raj Chakraborty, Reza M. Rad |
Bit string analysis of Physical Unclonable Functions based on resistance variations in metals and transistors. |
HOST |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat |
Label Size Increment of Bit String Based Labeling Scheme in Dynamic XML Updating. |
DEIS |
2011 |
DBLP DOI BibTeX RDF |
|
16 | William B. Langdon |
Elementary bit string mutation landscapes. |
FOGA |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Md. Saiful Islam 0003 |
BSSSN: Bit String Swapping Sorting Network for Reversible Logic Synthesis |
CoRR |
2010 |
DBLP BibTeX RDF |
|
16 | Abdelhamid Abdesselam, Hui Hui Wang, Narayanan Kulathuramaiyer |
Spiral Bit-string Representation of Color for Image Retrieval. |
Int. Arab J. Inf. Technol. |
2010 |
DBLP BibTeX RDF |
|
16 | Zhengjun Cao |
Analysis of one quantum bit string commitment. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
16 | Shih-Chuan Chiu, Man-Kwan Shan, Jiun-Long Huang, Hua-Fu Li |
Mining polyphonic repeating patterns from music data using bit-string based approaches. |
ICME |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Damián H. Zanette |
Analytical approach to bit-string models of language evolution |
CoRR |
2007 |
DBLP BibTeX RDF |
|
16 | Dietrich Stauffer, Stanislaw Cebrat |
Extinction in Genetic Bit-String Model with sexual Recombination. |
Adv. Complex Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yan Gao, Xiangping Meng, Wen Zheng, Lei Feng, Jin Qian |
Parallel Mining Association Rules with Bit String Array and Its Application in Power System. |
CCCT (2) |
2004 |
DBLP BibTeX RDF |
|
16 | Krzysztof Malarz, Mikolaj Sitarz, Piotr Gronek, Antoni Dydejczyk |
Size of the Stable Population in the Penna Bit-String Model of Biological Aging. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai |
Bit String Commitment Reductions with a Non-zero Rate. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Chu-Hui Lee, Po-Whei Huang |
An Efficient Indexing Scheme for Bit-String Signatures. |
IKE |
2003 |
DBLP BibTeX RDF |
|
16 | Nicholas Rhodes, Peter Willett 0002, James B. Dunbar Jr., Christine Humblet |
Bit-String Methods for Selective Compound Acquisition. |
J. Chem. Inf. Comput. Sci. |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Ling Xue, Jeffrey W. Godden, Jürgen Bajorath |
Database Searching for Compounds with Similar Biological Activity Using Short Binary Bit String Representations of Molecules. |
J. Chem. Inf. Comput. Sci. |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Darren R. Flower |
On the Properties of Bit String-Based Measures of Chemical Similarity. |
J. Chem. Inf. Comput. Sci. |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Lloyd Allison, Trevor I. Dix |
A Bit-String Longest-Common-Subsequence Algorithm. |
Inf. Process. Lett. |
1986 |
DBLP DOI BibTeX RDF |
|
16 | Alan F. Harding, Michael F. Lynch, Peter Willett 0002 |
Document Retrieval Using a Serial Bit String Search. |
Inf. Process. Manag. |
1983 |
DBLP DOI BibTeX RDF |
|
16 | Nancy A. Lynch, Edward K. Blum |
Relative Complexity of Operations on Numeric and Bit-String Algebras. |
Math. Syst. Theory |
1980 |
DBLP DOI BibTeX RDF |
|
16 | Iman Marvian, Saied Hosseini-Khayat |
Secure Data Transmission Using Qubits. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | David W. Matula, Alex Fit-Florea, Mitchell Aaron Thornton |
Table Lookup Structures for Multiplicative Inverses Modulo 2k. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Xuesong Yan, Pan Fang, Qingzhong Liang, Chengyu Hu |
Representations of Evolutionary Electronics. |
ISICA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Alberto Leporati, Claudio Zandron, Giancarlo Mauri |
How Redundant Is Your Universal Computation Device?. |
Workshop on Membrane Computing |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jin Qian, Feiyue Ye |
Mining Maximal Frequent Itemsets with Frequent Pattern List. |
FSKD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer |
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman transform, exponential sums, least significant bits, randomness extraction |
16 | Goo-Rak Kwon, Seung-Won Jung, Sang-Jae Nam, Sung-Jea Ko |
Improved Differential Energy Watermarking for Embedding Watermark. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko |
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Gualtiero Colombo 0001, Christine L. Mumford |
Comparing algorithms, representations and operators for the multi-objective knapsack problem. |
Congress on Evolutionary Computation |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Thomas Holenstein, Ueli M. Maurer, Johan Sjödin |
Complete Classification of Bilinear Hard-Core Functions. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Christian Cachin, Ueli M. Maurer |
Unconditional Security Against Memory-Bounded Adversaries. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
13 | Charlie Irawan Tan, Cong-Kai Lin, Wen-Kai Tai, Chin-Chen Chang 0002 |
Hiding data: a high-capacity distortionless approach. |
Multim. Syst. |
2009 |
DBLP DOI BibTeX RDF |
3D meta model, Data hiding, Storage model |
13 | Alexander A. Razborov, Sergey Yekhanin |
An Omega(n1/3) Lower Bound for Bilinear Group Based Private Information Retrieval. |
FOCS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel |
A New Keystream Generator MUGI. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
PANAMA, Re-synchronization attack, Block cipher, Related-key attack, Keystream generator |
13 | Gerhard C. Langelaar, Reginald L. Lagendijk |
Optimal differential energy watermarking of DCT encoded images and video. |
IEEE Trans. Image Process. |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Ravi Kumar 0001, D. Sivakumar 0001 |
Proofs, Codes, and Polynomial-Time Reducibilities. |
CCC |
1999 |
DBLP DOI BibTeX RDF |
reducibilities, proof systems, partial solutions |
13 | Michael J. Fischer, Rebecca N. Wright |
Multiparty Secret Key Exchange Using a Random Deal of Cards. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
13 | Oded Goldreich 0001, Hugo Krawczyk, Michael Luby |
On the Existence of Pseudorandom Generators. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
13 | Adam D. Smith |
Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes. |
SODA |
2007 |
DBLP BibTeX RDF |
|
13 | Phillip Rogaway, Mihir Bellare, John Black |
OCB: A block-cipher mode of operation for efficient authenticated encryption. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation |
13 | Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
OCB: a block-cipher mode of operation for efficient authenticated encryption. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation |
13 | Wim van Dam |
Quantum Oracle Interrogation: Getting All Information for Almost Half the Price. |
FOCS |
1998 |
DBLP DOI BibTeX RDF |
oracle/black-box model, computational complexity, quantum computation |
13 | Christian Cachin, Claude Crépeau, Julien Marcil |
Oblivious Transfer with a Memory-Bounded Receiver. |
FOCS |
1998 |
DBLP DOI BibTeX RDF |
|
13 | Thore Husfeldt, Theis Rauhe |
Hardness Results for Dynamic Problems by Extensions of Fredman and Saks' Chronogram Method. |
ICALP |
1998 |
DBLP DOI BibTeX RDF |
|
13 | Walter Vogler |
An Improved Multiple Identification Algorithm for Synchronous Broadcasting Networks. |
WDAG |
1987 |
DBLP DOI BibTeX RDF |
|
11 | Ueli M. Maurer, Stefano Tessaro |
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Signer Anonymity, Identity-Based Signature, Disjunctive Normal Form, Access Structure |
11 | Thomas Stibor |
Phase Transition and the Computational Complexity of Generating r -Contiguous Detectors. |
ICARIS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Junaed Sattar, Eric Bourque, Philippe Giguère, Gregory Dudek |
Fourier tags: Smoothly degradable fiducial markers for use in human-robot interaction. |
CRV |
2007 |
DBLP DOI BibTeX RDF |
|