Sciweavers

368 search results - page 63 / 74
» On new iterative method for solving systems of nonlinear equ...
Sort
View
DAGSTUHL
2007
13 years 9 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
LSSC
2001
Springer
13 years 12 months ago
Parallel Implementation of a Large-Scale 3-D Air Pollution Model
Abstract. Air pollution models can efficiently be used in different environmental studies. The atmosphere is the most dynamic component of the environment, where the pollutants ca...
Tzvetan Ostromsky, Zahari Zlatev
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
14 years 1 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
JSW
2007
126views more  JSW 2007»
13 years 7 months ago
On Remote and Virtual Experiments in eLearning
— The science of physics is based on theories and models as well as experiments: the former structure relations and simplify reality to a degree such that predictions on physical...
Sabina Jeschke, Harald Scheel, Thomas Richter, Chr...
ICIP
1994
IEEE
13 years 11 months ago
Total Variation Based Image Restoration with Free Local Constraints
The two main plagues of image restoration are oscillations and smoothing. Traditional image restoration techniques prevent parasitic oscillations by resorting to smooth regulariza...
Leonid I. Rudin, Stanley Osher