Sciweavers

53 search results - page 6 / 11
» Real algebraic numbers and polynomial systems of small degre...
Sort
View
ICCV
2005
IEEE
14 years 1 months ago
How Hard is 3-View Triangulation Really?
We present a solution for optimal triangulation in three views. The solution is guaranteed to find the optimal solution because it computes all the stationary points of the (maxi...
Henrik Stewénius, Frederik Schaffalitzky, D...
EUROCRYPT
2003
Springer
14 years 21 days ago
Algebraic Attacks on Stream Ciphers with Linear Feedback
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
Nicolas Courtois, Willi Meier
ASAP
2007
IEEE
107views Hardware» more  ASAP 2007»
14 years 1 months ago
A Hardware-Oriented Method for Evaluating Complex Polynomials
A hardware-oriented method for evaluating complex polynomials by solving iteratively a system of linear equations is proposed. Its implementation uses a digit-serial iterations on...
Milos D. Ercegovac, Jean-Michel Muller
ECCV
2006
Springer
14 years 9 months ago
A Simple Solution to the Six-Point Two-View Focal-Length Problem
Abstract. This paper presents a simple and practical solution to the 6-point 2view focal-length estimation problem. Based on the hidden-variable technique we have derived a 15th de...
Hongdong Li
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
14 years 1 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard