
EMD
 Referenced in 204 articles
[sw14902]
 between two distributions, which are represented by signatures. The signatures are sets of weighted features ... amount of work needed to change one signature into the other. The notion of ”work ... features. The size of the two signatures can be different. Also, the sum of weights ... signature can be different than the sum of weights of the other (partial match). Because...

HMQV
 Referenced in 77 articles
[sw02714]
 form of “challengeresponse signatures”, derived from the Schnorr identification scheme, that have the property ... challenger and signer can compute the same signature; the former by having chosen the challenge ... latter by knowing the private signature...

FLASH
 Referenced in 46 articles
[sw02233]
 FLASH, a fast multivariate signature algorithm. This article describes the particular parameter choice and implementation ... rare published, but not broken signature schemes, that allow signatures to be computed and checked ... submissions to NESSIE (New European Schemes for Signatures, Integrity, and Encryption), a project within...

NTRUSign
 Referenced in 38 articles
[sw11764]
 NTRUSign: Digital signatures using the NTRU lattice. We introduce NTRUSign, a new family of signature ... properties of general APPRCVP based signature schemes (e.g. GGH) and show that they ... obtainable from an analysis of a large signature transcript. In the case of NTRUSign this...

KEMDEM
 Referenced in 58 articles
[sw03093]
 attacks (INDP2C2) along with secure signatures and ideal certification authority are sufficient...

Gaigen
 Referenced in 33 articles
[sw04958]
 experimentation, many geometric algebras with different dimensionality, signatures and other properties may be required. Instead ... basis vectors, all 3 signatures are supported (1, 0, +1). It is also possible...

F5C
 Referenced in 26 articles
[sw35035]
 efficiency through the careful analysis of signatures assigned to each computed polynomial. However, it computes ... trivial task, because they correspond to signatures required for reduction. This paper revisits the theory ... that prunes redundant polynomials, then recomputes signatures to preserve correctness. This strategy successfully reduces...

ESIGN
 Referenced in 22 articles
[sw02120]
 ESIGN is an efficient digital signature algorithm [OkS], [Ok], whose computation speed is more than ... scheme, while its key length and signature length are comparable to those ... card. This realizes a computation time for signature generation of about 0.2 seconds. To achieve ... this remarkable speed for signature generation, appropriate implementation techniques such as precomputation and table...

ProVerif
 Referenced in 38 articles
[sw06558]
 shared and publickey cryptography (encryption and signatures), hash functions, and DiffieHellman key agreements...

WSAT
 Referenced in 37 articles
[sw01022]
 service itself (invocation interface and behavior signature) relies on a stack of XML based standards...

Polygraph
 Referenced in 17 articles
[sw23932]
 Polygraph: automatically generating signatures for polymorphic worms. It is widely believed that contentsignaturebased ... this paper, we present Polygraph, a signature generation system that successfully produces signatures that match ... polymorphic worms. Polygraph generates signatures that consist of multiple disjoint content substrings. In doing ... contribute a definition of the polymorphic signature generation problem; propose classes of signature suited...

BEASY
 Referenced in 34 articles
[sw01168]
 computer simulation for Corrosion Control, Galvanic Corrosion, Signature Management, Defect Assessment and Crack Growth Simulation...

Autograph
 Referenced in 16 articles
[sw23929]
 Autograph: toward automated, distributed worm signature detection. Today’s Internet intrusion detection systems (IDSes) monitor ... novel Internet worms. Generation of the worm signatures required by an IDSthe byte patterns ... study packet traces to produce a worm signature. Yet intervention must occur early ... Autograph is a system that automatically generates signatures for novel Internet worms that propagate using...

F2PY
 Referenced in 30 articles
[sw04610]
 C/API modules from (handwritten or F2PY generated) signature files (or directly from Fortran sources...

PIPER
 Referenced in 28 articles
[sw11478]
 tool – PIPER. PIPER exploits type signatures provided by the programmer to partition the model checking...

SIGREF
 Referenced in 15 articles
[sw00859]
 present a uniform signaturebased approach to compute the most popular bisimulations. Our approach ... handling of very large transition systems. Signatures for the bisimulations are built up from ... operations. Thus, the definition of an appropriate signature is the key for a rapid development...

TinyECC
 Referenced in 18 articles
[sw09089]
 sensor network applications. It provides a digital signature scheme (ECDSA), a key exchange protocol (ECDH...

SMTRAT
 Referenced in 17 articles
[sw13091]
 quantifierfree formulas built over a signature of uninterpreted sort and function symbols...

BIOMET
 Referenced in 10 articles
[sw02474]
 database including face, voice, fingerprint, hand and signature modalities. Information technology innovations involve a constant ... human face images, hand shape, voice, handwritten signature... In order to take advantage ... modalities, including face, voice, fingerprint, hand and signature data. In this paper, the BIOMET multimodal...

Catfish
 Referenced in 11 articles
[sw00109]
 rate. Until now, numerical studies of observational signatures have used Monte Carlo generators implementing ... evolution. CATFISH deals with the observational signatures of black hole events beyond the simple semiclassical...