Sciweavers

634 search results - page 22 / 127
» Groundwork for Weak Analysis
Sort
View
ACISP
2008
Springer
14 years 4 months ago
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Abstract. This paper presents a critical analysis of the AACS drivehost authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. I...
Jiayuan Sui, Douglas R. Stinson
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
14 years 3 months ago
Analysis of Involutional Ciphers: Khazad and Anubis
In this paper we study structural properties of SPN ciphers in which both the S-boxes and the affine layers are involutions. We apply our observations to the recently designed Rijn...
Alex Biryukov
ICRA
2010
IEEE
149views Robotics» more  ICRA 2010»
13 years 8 months ago
Observability analysis of relative localization for AUVs based on ranging and depth measurements
— The paper studies the observability properties of the relative localization of two Autonomous Underwater Vehicles (AUVs) equipped with depth sensors, linear/angular velocity se...
Gianluca Antonelli, Filippo Arrichiello, Stefano C...
INDOCRYPT
2003
Springer
14 years 3 months ago
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficie...
Souradyuti Paul, Bart Preneel
DAM
2006
79views more  DAM 2006»
13 years 9 months ago
A simple expected running time analysis for randomized "divide and conquer" algorithms
There are many randomized "divide and conquer" algorithms, such as randomized Quicksort, whose operation involves partitioning a problem of size n uniformly at random int...
Brian C. Dean