Sciweavers

286 search results - page 14 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
ISESE
2006
IEEE
14 years 1 months ago
Using observational pilot studies to test and improve lab packages
Controlled experiments are a key approach to evaluate and evolve our understanding of software engineering technologies. However, defining and running a controlled experiment is a...
Manoel G. Mendonça, Daniela Cruzes, Josemei...
INTERACT
2003
13 years 9 months ago
Messaging And Formality: Will IM Follow in the Footsteps of Email?
: One virtue of instant messaging is informality. As messaging is used more in work settings, being able to consult an exchange later can be beneficial. However, archived communica...
Tracey Lovejoy, Jonathan Grudin
ACE
2004
163views Education» more  ACE 2004»
13 years 9 months ago
Adventure Cycles A Software Engineering Approach
In this paper we discuss using a case study to demonstrate the software engineering process from requirements, specification, preliminary user manual, prototyping, design, impleme...
John Paynter, Emma Sharkey