Sciweavers

320 search results - page 6 / 64
» Conditionals and consequences
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
JSYML
2007
106views more  JSYML 2007»
13 years 9 months ago
Characterizing rosy theories
We examine several conditions, either the existence of a rank or a particular property of þ-forking that suggest the existence of a well-behaved independence relation, and determi...
Clifton Ealy, Alf Onshuus
JGO
2010
96views more  JGO 2010»
13 years 8 months ago
Duality and optimality conditions for generalized equilibrium problems involving DC functions
We consider a generalized equilibrium problem involving DC functions which is called (GEP). For this problem we establish two new dual formulations based on Toland-Fenchel-Lagrange...
N. Dinh, Jean-Jacques Strodiot, Van Hien Nguyen
ECAL
2007
Springer
14 years 4 months ago
Individual Selection for Cooperative Group Formation
It is well known that certain environmental conditions, such as a spatially structured population, can promote the evolution of cooperative traits. However, such conditions are usu...
Simon T. Powers, Alexandra S. Penn, Richard A. Wat...
ESORICS
2006
Springer
14 years 1 months ago
Conditional Reactive Simulatability
Abstract. Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositio...
Michael Backes, Markus Dürmuth, Dennis Hofhei...