Sciweavers

255 search results - page 30 / 51
» On Multidimensional Linear Cryptanalysis
Sort
View
VLDB
1997
ACM
112views Database» more  VLDB 1997»
13 years 11 months ago
Selectivity Estimation Without the Attribute Value Independence Assumption
The result size of a query that involves multiple attributes from the same relation depends on these attributes’ joint data distribution,i.e., the frequencies of all combination...
Viswanath Poosala, Yannis E. Ioannidis
ICASSP
2010
IEEE
13 years 7 months ago
On distance reconstruction for sensor network localization
Sensor localization typically exploits distance measurements to infer sensor positions with respect to known anchor nodes. Missing or unreliable measurements for specific nodes c...
Phillip A. Regalia, Jing Wang
JMIV
2000
90views more  JMIV 2000»
13 years 7 months ago
Invariants to Convolution in Arbitrary Dimensions
Processing of multidimensional image data which were acquired by a linear imaging system of unknown point-spread function (PSF) is an important problem whose solution usually requi...
Jan Flusser, Jirí Boldys, Barbara Zitov&aac...
ICICS
2009
Springer
14 years 2 months ago
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
14 years 2 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes