Sciweavers

583 search results - page 59 / 117
» On the Complexity of Matsui's Attack
Sort
View
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
12 years 12 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 9 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
ATAL
2009
Springer
14 years 3 months ago
Inconsistency tolerance in weighted argument systems
We introduce and investigate a natural extension of Dung’s well-known model of argument systems in which attacks are associated with a weight, indicating the relative strength o...
Paul E. Dunne, Anthony Hunter, Peter McBurney, Sim...
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern
Presently, almost all of the watermarking algorithms resistant to geometric attacks are dependent on the synchronization. In this paper, a geometrically robust watermarking scheme...
Hefei Ling, Zhengding Lu, Fuhao Zou, Wugang Yuan
IWIA
2006
IEEE
14 years 2 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock