Sciweavers

491 search results - page 77 / 99
» Linear Quantifier Elimination
Sort
View
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
14 years 1 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 29 days ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
AVSS
2003
IEEE
14 years 25 days ago
A Scalable Image-Based Multi-Camera Visual Surveillance System
In this paper, we aim to achieve scalability and wider scene coverage through the use of multiple cameras in an outdoor visual surveillance system. Only image-based information is...
Ser-Nam Lim, Larry S. Davis, Ahmed M. Elgammal
SAS
2001
Springer
13 years 12 months ago
Solving Regular Tree Grammar Based Constraints
This paper describes the precise speci cation, design, analysis, implementation, and measurements of an e cient algorithm for solving regular tree grammar based constraints. The p...
Yanhong A. Liu, Ning Li, Scott D. Stoller
PLDI
2000
ACM
13 years 12 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps