Sciweavers

729 search results - page 43 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
AC
1997
Springer
13 years 12 months ago
Recent Developments in the Design of Conventional Cryptographic Algorithms
Abstract. This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a...
Bart Preneel, Vincent Rijmen, Antoon Bosselaers
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
13 years 8 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
DOLAP
2004
ACM
14 years 1 months ago
An analysis of additivity in OLAP systems
Accurate summary data is of paramount concern in data warehouse systems; however, there have been few attempts to completely characterize the ability to summarize measures. The su...
John Horner, Il-Yeol Song, Peter P. Chen
RTSS
2003
IEEE
14 years 1 months ago
Periodic Resource Model for Compositional Real-Time Guarantees
We address the problem of providing compositional hard real-time guarantees in a hierarchy of schedulers. We first propose a resource model to characterize a periodic resource al...
Insik Shin, Insup Lee
FPLE
1995
13 years 11 months ago
Explaining Algebraic Theory with Functional Programs
Abstract. A hierarchy of six important structures from abstract algebra (groups, rings, fields etc.) is introduced as Gofer class definitions and laws about them. Many instance d...
Jeroen Fokker