Sciweavers

3255 search results - page 480 / 651
» Combination of Abstractions in the ASTR
Sort
View
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
DSMML
2004
Springer
14 years 3 months ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
EUROCRYPT
2004
Springer
14 years 3 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
FPL
2004
Springer
110views Hardware» more  FPL 2004»
14 years 3 months ago
Versatile Imaging Architecture Based on a System on Chip
Abstract. In this paper, a novel architecture dedicated to image processing is presented. The most original aspect of the approach is the use of a System On Chip implemented in a F...
Pierre Chalimbaud, François Berry
FQAS
2004
Springer
104views Database» more  FQAS 2004»
14 years 3 months ago
Logic-Based Integration of Query Answering and Knowledge Discovery
Abstract. There is currently great interest in integrating knowledge discovery research into mainstream database systems. Such an enterprise is nontrivial because knowledge discove...
Marcelo A. T. Aragão, Alvaro A. A. Fernande...