Sciweavers

230 search results - page 9 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
INFORMATICALT
2000
125views more  INFORMATICALT 2000»
13 years 7 months ago
An Algorithm for Construction of Test Cases for the Quadratic Assignment Problem
In this paper we present an algorithm for generating quadratic assignment problem (QAP) instances with known provably optimal solution. The flow matrix of such instances is constru...
Gintaras Palubeckis
FPL
2008
Springer
131views Hardware» more  FPL 2008»
13 years 9 months ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...
FC
2003
Springer
171views Cryptology» more  FC 2003»
14 years 26 days ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert
JOC
2008
92views more  JOC 2008»
13 years 7 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
ICRA
1995
IEEE
122views Robotics» more  ICRA 1995»
13 years 11 months ago
Actuator Constraints in Optimal Motion Planning of Manipulators
The optimal motion generation problem is solved subject to various actuator constraints while the motion is constrained to an arbitrary path. The considered objective function is ...
Patrick Plédel, Yasmina Bestaoui