Sciweavers

2214 search results - page 303 / 443
» Initial Design of the
Sort
View
ASIACRYPT
2007
Springer
14 years 3 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 3 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
DNA
2007
Springer
159views Bioinformatics» more  DNA 2007»
14 years 3 months ago
Activatable Tiles: Compact, Robust Programmable Assembly and Other Applications
While algorithmic DNA self-assembly is, in theory, capable of forming complex patterns, its experimental demonstration has been limited by significant assembly errors. In this pa...
Urmi Majumder, Thomas H. LaBean, John H. Reif
EMSOFT
2007
Springer
14 years 3 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis
ER
2007
Springer
107views Database» more  ER 2007»
14 years 3 months ago
A Conceptual Framework to Support Semantic Interoperability of Geospatial Datacubes
Today, we observe a wide use of geospatial databases that are implemented in many forms (e.g. transactional centralized systems, distributed databases, multidimensional datacubes)....
Tarek Sboui, Yvan Bédard, Jean Brodeur, Thi...