Sciweavers

729 search results - page 55 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
PLDI
2003
ACM
14 years 3 months ago
A static analyzer for large safety-critical software
d Abstract) Bruno Blanchet∗ § Patrick Cousot§ Radhia Cousot∗¶ J´erˆome Feret§ Laurent Mauborgne§ Antoine Min´e§ David Monniaux∗§ Xavier Rival§ that abstract inter...
Bruno Blanchet, Patrick Cousot, Radhia Cousot, J&e...
ALT
2009
Springer
14 years 7 months ago
Pure Exploration in Multi-armed Bandits Problems
Abstract. We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of strategies that explore sequentially the arms. The stra...
Sébastien Bubeck, Rémi Munos, Gilles...
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
14 years 4 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
SG
2009
Springer
14 years 4 months ago
The Pie Slider: Combining Advantages of the Real and the Virtual Space
Abstract. The Pie Segment Slider is a novel parameter control interface combining the advantages of tangible input with the customizability of a graphical interface representation....
Alexander Kulik, André Kunert, Christopher ...
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
14 years 4 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...