Sciweavers

2446 search results - page 116 / 490
» Polyadic Concept Analysis
Sort
View
ICIC
2007
Springer
14 years 3 months ago
Analysis of Pi Series and Its Application to Image Encryption
Whether constant π (i.e., pi) is normal is a confusing problem without any strict theoretical demonstration except for some statistical proof. A new concept of pi series is introd...
Ting Chen, Feng Li
ISMAR
2006
IEEE
14 years 2 months ago
Performance analysis of an outdoor augmented reality tracking system that relies upon a few mobile beacons
We describe and evaluate a new tracking concept for outdoor Augmented Reality. A few mobile beacons added to the environment correct errors in head-worn inertial and GPS sensors. ...
Ronald Azuma, Howard Neely, Mike Daily, Jon Leonar...
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
14 years 2 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 2 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
14 years 2 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...