Sciweavers

229 search results - page 13 / 46
» Roots of Square: Cryptanalysis of Double-Layer Square and Sq...
Sort
View
DAC
2003
ACM
14 years 10 months ago
Efficient model order reduction including skin effect
Skin effect makes interconnect resistance and inductance frequency dependent. This paper addresses the problem of efficiently estimating the signal characteristics of any RLC netw...
Shizhong Mei, Chirayu S. Amin, Yehea I. Ismail
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 3 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
IWDW
2009
Springer
14 years 3 months ago
Estimating the Information Theoretic Optimal Stego Noise
We recently developed a new benchmark for steganography, underpinned by the square root law of capacity, called Steganographic Fisher Information (SFI). It is related to the multip...
Andrew D. Ker
IROS
2007
IEEE
117views Robotics» more  IROS 2007»
14 years 3 months ago
Fast 3D pose estimation with out-of-sequence measurements
— We present an algorithm for pose estimation using fixed-lag smoothing. We show that fixed-lag smoothing enables inclusion of measurements from multiple asynchronous measureme...
Ananth Ranganathan, Michael Kaess, Frank Dellaert