In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Controlled experiments are a key approach to evaluate and evolve our understanding of software engineering technologies. However, defining and running a controlled experiment is a...
: One virtue of instant messaging is informality. As messaging is used more in work settings, being able to consult an exchange later can be beneficial. However, archived communica...
In this paper we discuss using a case study to demonstrate the software engineering process from requirements, specification, preliminary user manual, prototyping, design, impleme...