Sciweavers

704 search results - page 125 / 141
» A Practical Attack on KeeLoq
Sort
View
KI
1999
Springer
14 years 1 months ago
Systematic vs. Local Search for SAT
Abstract. Due to its prominence in artificial intelligence and theoretical computer science, the propositional satisfiability problem (SAT) has received considerable attention in...
Holger H. Hoos, Thomas Stützle
NGITS
1999
Springer
14 years 1 months ago
Multiplex: A Formal Model for Multidatabases and Its Implementation
The integration of information from multiple databases has been an enduring subject of research for over 20 years, and many different solutions have been attempted or proposed. Mis...
Amihai Motro
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
14 years 1 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
AGENTS
1997
Springer
14 years 1 months ago
Modeling an Environment: Agents in Character Feature Extraction
A feature extraction system based on artificial life concepts is presented. The system provides automatic character feature extraction through the local actions of autonomous feat...
Lijia Zhou, Stan Franklin
CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
14 years 1 months ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel