Sciweavers

628 search results - page 84 / 126
» On the Twofish Key Schedule
Sort
View
SIGMETRICS
1993
ACM
106views Hardware» more  SIGMETRICS 1993»
14 years 3 days ago
Software Performance Engineering
: Performance is critical to the success of today’s software systems. However, many software products fail to meet their performance objectives when they are initially constructe...
Connie U. Smith
CAV
2007
Springer
212views Hardware» more  CAV 2007»
14 years 17 hour ago
A Tutorial on Satisfiability Modulo Theories
Abstract. Solvers for satisfiability modulo theories (SMT) check the satisfiability of first-order formulas containing operations from various theories such as the Booleans, bit-ve...
Leonardo Mendonça de Moura, Bruno Dutertre,...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
ADAEUROPE
2008
Springer
13 years 10 months ago
Real-Time Distribution Middleware from the Ada Perspective
Standards for distribution middleware sometimes impose restrictions and often allow the implementations to decide on aspects that are fundamental to the correct and efficient behav...
Héctor Pérez, J. Javier Gutié...
ATMOS
2008
187views Optimization» more  ATMOS 2008»
13 years 9 months ago
Solving Periodic Timetable Optimisation Problems by Modulo Simplex Calculations
In the last 15 years periodic timetable problems have found much interest in the combinatorial optimization community. We will focus on the optimisation task to minimise a weighted...
Karl Nachtigall, Jens Opitz