Sciweavers

1418 search results - page 105 / 284
» How to Explain Mistakes
Sort
View
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
SCN
2004
Springer
121views Communications» more  SCN 2004»
14 years 3 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
SCVMA
2004
Springer
14 years 3 months ago
On the Relationship Between Image and Motion Segmentation
Abstract. In this paper we present a generative model for image sequences, which can be applied to motion segmentation and tracking, and to image sequence compression. The model co...
Adrian Barbu, Song Chun Zhu
ACSAC
2003
IEEE
14 years 3 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
ASAP
2003
IEEE
153views Hardware» more  ASAP 2003»
14 years 3 months ago
Hardware Synthesis for Multi-Dimensional Time
This paper introduces basic principles for extending the classical systolic synthesis methodology to multi-dimensional time. Multi-dimensional scheduling enables complex algorithm...
Anne-Claire Guillou, Patrice Quinton, Tanguy Risse...