Search results
Jump to navigation
Jump to search
- | designers = ...r Message Authentication|conference=EUROCRYPT '95|journal=Lecture Notes in Computer Science|volume=921|year=1995|pages=301–310|issn=0302-9743|doi=10.1007/3-540 ...2 KB (319 words) - 03:43, 6 January 2024
- | designers = [[Lars R. Knudsen]] ...– CT-RSA 2007 |chapter=Second Preimages for SMASH |series=Lecture Notes in Computer Science |year=2006|volume=4377|pages=101–111|doi=10.1007/11967668_7|isbn=97 ...2 KB (331 words) - 16:47, 22 August 2023
- {{short description|Cryptographic protocol designed to resist quantum computer attacks}} ...Thomas Pöppelmann, and Peter Schwabe that is designed to resist [[quantum computer]] attacks.<ref name="cf">{{cite web|url=https://newhopecrypto.org/index.sht ...4 KB (523 words) - 19:18, 13 February 2025
- * [[Hexadecimal]]: Base 16, widely used by computer system designers and programmers, as it provides a more human-friendly representation of bin * [[Octal]]: Base 8, occasionally used by computer system designers and programmers. ...9 KB (1,334 words) - 19:40, 24 January 2025
- | designers = [[Technical University of Denmark]], [[INRIA]], [[Ruhr University Boc ...ology – CRYPTO '96|volume = 1109|pages = 252–267|series = Lecture Notes in Computer Science|year = 1996|last1 = Kilian|first1 = Joe|last2 = Rogaway|first2 = Ph ...13 KB (1,867 words) - 14:37, 2 May 2024
- '''Brushes''' are templates used in some [[3D computer graphics|3D]] video [[game engine]]s, such as the [[Quake engine]], its der ...computational hardware. Brushes offered a viable solution, enabling level designers to utilize elementary geometric primitives for the creation of intricate sp ...5 KB (813 words) - 16:19, 10 October 2024
- | designers = [[Amit Sahai]], [[Brent Waters]], [[Dan Boneh]], [[Shafi Goldwasser]] ...pter=How to Run Turing Machines on Encrypted Data |series=Lecture Notes in Computer Science |year=2013|volume=8043 |pages=536–553 |doi=10.1007/978-3-642-40084- ...5 KB (648 words) - 16:12, 30 November 2024
- ...e the use of versions of ciphers with fewer rounds than specified by their designers. Since a single round is usually cryptographically weak, many attacks that ...ner | first2 = David | chapter = Slide Attacks | series = Lecture Notes in Computer Science | date = 1999 | volume = 1636 | pages = 245–259 | publisher = Sprin ...8 KB (1,081 words) - 04:44, 30 November 2024
- ...ons for classification|loss function]] widely used in [[One-shot learning (computer vision)|one-shot learning]], a setting where models are trained to generali | publisher = IEEE Computer Society ...8 KB (1,249 words) - 21:02, 23 February 2025
- {{Short description|Educational learning method using computer algorithms and AI}} ...hnology encompasses aspects derived from various fields of study including computer science, AI, [[psychometrics]], education, psychology, and brain science. ...17 KB (2,456 words) - 07:32, 29 October 2024
- ...s]] its functionality, it retrieves its inputs by following the [[Pointer (computer programming)|pointers]] stored in its inputs to retrieve data output by oth ...en thought to have led the way to what is known as [[Computer-aided design|computer-aided design (CAD)]] today. ...25 KB (3,697 words) - 19:57, 15 December 2024
- |designers = InfoTeCS JSC<ref>{{Cite web |url=http://tc26.ru/standard/draft/PR_GO ...me for the cipher is ''Kuznyechik'' ({{IPAc-en|k|ʊ|z|n|ˈ|ɛ|tʃ|ɪ|k|}}). The designers claim that by naming the cipher Kuznyechik they follow the trend of difficu ...10 KB (1,355 words) - 18:37, 7 January 2025
- ...irst=T.|title=Power: a first-class architectural design constraint|journal=Computer|date=Apr 2001|volume=34|issue=4|pages=52–58|doi=10.1109/2.917539|citeseerx= ...ces or result in energy savings for Internet companies operating with many computer servers.<ref name="Low-cost Estimation of Sub-system Power"/> The following ...46 KB (6,919 words) - 00:36, 25 January 2024
- {{Short description|Mechanical analog computer}} {{Infobox computer hardware|name=Tide-Predicting Machine No. 2|logo=|logo-size=|logo_caption=| ...19 KB (2,906 words) - 21:56, 9 November 2024
- | designers = [[Bruce Schneier]], [[Niels Ferguson]], [[Stefan Lucks]], Doug Whitin | series = Lecture Notes in Computer Science ...10 KB (1,423 words) - 06:34, 17 December 2024
- ...n Position in Scatterplots |journal=IEEE Transactions on Visualization and Computer Graphics |volume=28 |issue=1 |pages=987–997 |year=2022 |doi=10.1109/TVCG.20 ...]] of the layout constructed with bubbles.<ref>Bryan Lawson (2004). ''What Designers Know''. Elsevier, 2004. {{ISBN|0-7506-6448-7}}. p.44.</ref> ...8 KB (1,245 words) - 20:30, 10 July 2024
- ...rt]] and [[Prisma (app)|Prisma]]. This method has been used by artists and designers around the globe to develop new artwork based on existent style(s). ...sfer |date=August 2001 |title=Proceedings of the 28th annual conference on Computer graphics and interactive techniques |chapter-url=https://dl.acm.org/doi/10. ...15 KB (2,389 words) - 04:10, 26 September 2024
- ...radar]], [[control system]]s, [[music synthesis]], [[image processing]], [[computer graphics]], and [[structural dynamics]]. ...nication systems use [[frequency-division multiplexing]], where the system designers divide a wide frequency band into many narrower frequency bands called "slo ...22 KB (3,208 words) - 05:15, 9 January 2025
- {{short description|32-bit computer number format}} ...32''') is a [[computer number format]], usually occupying [[32 bits]] in [[computer memory]]; it represents a wide [[dynamic range]] of numeric values by using ...22 KB (2,713 words) - 02:18, 11 January 2025
- | designers = [[Daniel Augot]], [[Matthieu Finiasz]], [[Nicolas Sendrier]] |series=Lecture Notes in Computer Science ...19 KB (2,944 words) - 20:50, 12 August 2024