Sciweavers

230 search results - page 20 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
13 years 11 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
JCST
2007
98views more  JCST 2007»
13 years 7 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 7 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
GD
2005
Springer
14 years 1 months ago
Fast Node Overlap Removal
Most graph layout algorithms treat nodes as points. The problem of node overlap removal is to adjust the layout generated by such methods so that nodes of non-zero width and height...
Tim Dwyer, Kim Marriott, Peter J. Stuckey
ICRA
2003
IEEE
143views Robotics» more  ICRA 2003»
14 years 29 days ago
Cooperative task planning of multi-robot systems with temporal constraints
This paper discusses a design methodology of cooperative trajectory generation for multi-robot systems. The trajectory of achieving cooperative tasks, i.e., with temporal constrai...
Feng-Li Lian, Richard M. Murray