Sciweavers

156 search results - page 27 / 32
» On the Round Complexity of Covert Computation
Sort
View
IWSEC
2009
Springer
14 years 1 months ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
14 years 1 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
3DPVT
2006
IEEE
215views Visualization» more  3DPVT 2006»
14 years 1 months ago
Region-Based Motion Analysis and 3D Reconstruction for a Translational Video Sequence
This paper presents a hybrid 1D motion estimation algorithm which combines pixel-based and region-based approaches that can give depth images from translational video sequences wi...
Xiaodong Huang, Eric Dubois
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
13 years 10 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
SODA
2004
ACM
115views Algorithms» more  SODA 2004»
13 years 8 months ago
Minimizing the stabbing number of matchings, trees, and triangulations
The (axis-parallel) stabbing number of a given set of line segments is the maximum number of segments that can be intersected by any one (axis-parallel) line. We investigate probl...
Sándor P. Fekete, Marco E. Lübbecke, H...