Sciweavers

16 search results - page 2 / 4
» On Attacks on Filtering Generators Using Linear Subspace Str...
Sort
View
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
15 years 7 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...
KDD
2005
ACM
118views Data Mining» more  KDD 2005»
16 years 2 months ago
On the use of linear programming for unsupervised text classification
We propose a new algorithm for dimensionality reduction and unsupervised text classification. We use mixture models as underlying process of generating corpus and utilize a novel,...
Mark Sandler
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 7 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
171
Voted
CVPR
2009
IEEE
16 years 9 months ago
Learning General Optical Flow Subspaces for Egomotion Estimation and Detection of Motion Anomalies
This paper deals with estimation of dense optical flow and ego-motion in a generalized imaging system by exploiting probabilistic linear subspace constraints on the flow. We dea...
Richard Roberts (Georgia Institute of Technology),...
CGF
2008
103views more  CGF 2008»
15 years 2 months ago
Image-based Shaving
Many categories of objects, such as human faces, can be naturally viewed as a composition of several different layers. For example, a bearded face with glasses can be decomposed i...
Minh Hoai Nguyen, Jean-François Lalonde, Al...