Sciweavers

1249 search results - page 51 / 250
» Limitations of the Even-Mansour Construction
Sort
View
CCS
2006
ACM
14 years 1 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
GLOBECOM
2008
IEEE
14 years 4 months ago
Small Logarithmic S-Boxes for Small Ciphers
-- The substitution box (S-Box) is one of the most important components in modern ciphers. This paper reports a new class of S-Boxes defined by the logarithmic functions in GF(16)....
Xian Liu
MA
1999
Springer
105views Communications» more  MA 1999»
14 years 2 months ago
The JavaSeal Mobile Agent Kernel
JavaSeal is a secure mobile agent kernel that provides a small set of abstractions for constructing agent applicahis paper describes the design of these abstractions and their imp...
Ciarán Bryce, Jan Vitek
ICLP
2010
Springer
14 years 1 months ago
From Relational Specifications to Logic Programs
This paper presents a compiler from expressive, relational specifications to logic programs. Specifically, the compiler translates the Imperative Alloy specification language to...
Joseph P. Near
HASKELL
2007
ACM
14 years 1 months ago
Comprehensive comprehensions
We propose an extension to list comprehensions that makes it easy to express the kind of queries one would write in SQL using ORDER BY, GROUP BY, and LIMIT. Our extension adds exp...
Simon L. Peyton Jones, Philip Wadler