Sciweavers

81 search results - page 11 / 17
» Improving Fast Algebraic Attacks
Sort
View
AFRICACRYPT
2008
Springer
14 years 1 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
VALUETOOLS
2006
ACM
176views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
How to solve large scale deterministic games with mean payoff by policy iteration
Min-max functions are dynamic programming operators of zero-sum deterministic games with finite state and action spaces. The problem of computing the linear growth rate of the or...
Vishesh Dhingra, Stephane Gaubert
STACS
2007
Springer
14 years 1 months ago
On Fixed Point Equations over Commutative Semirings
Fixed point equations x = f(x) over ω-continuous semirings can be seen as the mathematical foundation of interprocedural program analysis. The sequence 0, f(0), f2 (0), . . . conv...
Javier Esparza, Stefan Kiefer, Michael Luttenberge...
ISBI
2006
IEEE
14 years 8 months ago
Reconstruction of undersampled dynamic spiral MR images
The temporal resolution of dynamic MRI can be increased by sampling a fraction of k-space in an interleaved fashion, which causes spatial and temporal aliasing. We describe algebr...
Taehoon Shin, Jon F. Nielsen, Krishna S. Nayak
ICSE
2008
IEEE-ACM
14 years 7 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...