Sciweavers

534 search results - page 31 / 107
» One more bit is enough
Sort
View
ECEASST
2010
13 years 5 months ago
Damages and Benefits of Certification: A perspective from an Independent Assessment Body
Abstract: The need of confidence that a product or service actually possesses declared behavioural / structural characteristics is the main reason for certification. It seems that ...
Mario Fusani, Eda Marchetti
ICASSP
2011
IEEE
12 years 11 months ago
Using stacked transformations for recognizing foreign accented speech
A common problem in speech recognition for foreign accented speech is that there is not enough training data for an accent-specific or a speaker-specific recognizer. Speaker ada...
Peter Smit, Mikko Kurimo
SACRYPT
2007
Springer
14 years 2 months ago
Two Trivial Attacks on Trivium
Trivium is a stream cipher designed in 2005 by C. De Canni`ere and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has ...
Alexander Maximov, Alex Biryukov
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
14 years 2 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois