Sciweavers

3116 search results - page 74 / 624
» Recovering
Sort
View
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
13 years 11 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...
DCOSS
2008
Springer
13 years 9 months ago
Stochastic Counting in Sensor Networks, or: Noise Is Good
We propose a novel algorithm of counting indistinguishable objects by a collection of sensors. The information on multiple counting is recovered from the stochastic correlation pat...
Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung...
FLAIRS
2006
13 years 9 months ago
Evolving Keys for Periodic Polyalphabetic Ciphers
A genetic algorithm is used to find the keys of Type II periodic polyalphabetic ciphers with mixed primary alphabets. Because of the difficulty of the ciphertext only cryptanalysi...
Ralph Morelli, Ralph Walde
ICISC
2004
120views Cryptology» more  ICISC 2004»
13 years 9 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois
EACL
1993
ACL Anthology
13 years 9 months ago
The donkey strikes back: Extending the dynamic interpretation "constructively"
The dynamic interpretation of a formula as a binary relation (inducing transitions) on states is extended by alternative treatments of implication, universal quantification, negat...
Tim Fernando