Sciweavers

634 search results - page 9 / 127
» Groundwork for Weak Analysis
Sort
View
APAL
2007
63views more  APAL 2007»
13 years 9 months ago
Bounded functional interpretation and feasible analysis
In this article we study applications of the bounded functional interpretation to theories of feasible arithmetic and analysis. The main results show that the novel interpretation...
Fernando Ferreira, Paulo Oliva
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 1 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
GLVLSI
2006
IEEE
98views VLSI» more  GLVLSI 2006»
14 years 3 months ago
Rapid intermodulation distortion estimation in fully balanced weakly nonlinear Gm-C filters using state-space modeling
State-space modeling of fully differential Gm-C filters with weak nonlinearities is used to develop a fast algorithm for intermodulation distortion estimation. It results in sim...
Paul Sotiriadis, Abdullah Celik, Zhaonian Zhang
CSDA
2010
67views more  CSDA 2010»
13 years 9 months ago
Factor-GMM estimation with large sets of possibly weak instruments
This paper analyses the use of factor analysis for instrumental variable estimation when the number of instruments tends to infinity. We consider cases where the unobserved factor...
George Kapetanios, Massimiliano Marcellino
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 9 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis