Sciweavers

1722 search results - page 33 / 345
» Dedication
Sort
View
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Preimages for Reduced SHA-0 and SHA-1
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of ...
Christophe De Cannière, Christian Rechberge...
LREC
2008
114views Education» more  LREC 2008»
13 years 11 months ago
A Web Browser Extension for Growing-up Ontological Knowledge from Traditional Web Content
While the Web is facing interesting new changes in the way users access, interact and even participate to its growth, the most traditional applications dedicated to its fruition: ...
Maria Teresa Pazienza, Marco Pennacchiotti, Armand...
CORIA
2009
13 years 11 months ago
Classement collaboratif de manuscrits
Every electronic edition of manuscripts begins by ordering the studied corpus. This operation is of a highly hermeneutic nature and contribute to the construction of each researche...
Pierre-Edouard Portier
EJC
2008
13 years 10 months ago
Substitution tilings with statistical circular symmetry
Two new series of substitution tilings are introduced in which the tiles appear in infinitely many orientations. It is shown that several properties of the well-known pinwheel tili...
Dirk Frettlöh
ENTCS
2008
68views more  ENTCS 2008»
13 years 10 months ago
The Reach-and-Evolve Algorithm for Reachability Analysis of Nonlinear Dynamical Systems
This paper introduces a new algorithm dedicated to the rigorous reachability analysis of nonlinear dynamical systems. The algorithm is initially presented in the context of discre...
Pieter Collins, Alexandre Goldsztejn