Sciweavers

133 search results - page 9 / 27
» Reduced Complexity Attacks on the Alternating Step Generator
Sort
View
ACSC
2005
IEEE
14 years 28 days ago
A Two-Pronged Attack on the Dragon of Intractability
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...
Stephen Gilmour, Mark Dras
HYBRID
2000
Springer
13 years 11 months ago
Towards Procedures for Systematically Deriving Hybrid Models of Complex Systems
Abstract. In many cases, complex system behaviors are naturally modeled as nonlinear differential equations. However, these equations are often hard to analyze because of "sti...
Pieter J. Mosterman, Gautam Biswas
FSE
2007
Springer
129views Cryptology» more  FSE 2007»
14 years 1 months ago
Cryptanalysis of FORK-256
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong et al. at FSE 2006. This cryptanalysis is based on some unexpected differential...
Krystian Matusiewicz, Thomas Peyrin, Olivier Bille...
ICIP
2000
IEEE
14 years 9 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
CORR
2012
Springer
249views Education» more  CORR 2012»
12 years 3 months ago
Computing Cartograms with Optimal Complexity
We show how to compute cartograms with worst-case optimal polygonal complexity. Specifically we study rectilinear duals which are side-contact representations of a planar graph G ...
Md. Jawaherul Alam, Therese C. Biedl, Stefan Felsn...