Sciweavers

18 search results - page 2 / 4
» Searching for the Optimum Correlation Attack
Sort
View
AFRICACRYPT
2008
Springer
14 years 1 months ago
Correlated Keystreams in Moustique
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different...
Emilia Käsper, Vincent Rijmen, Tor E. Bj&osla...
RECSYS
2009
ACM
14 years 8 days ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
ICANN
2003
Springer
14 years 25 days ago
Optimizing Property Codes in Protein Data Reveals Structural Characteristics
We search for assignments of numbers to the amino acids (property codes) that maximize the autocorrelation function signal in given protein sequence data by an iterative method. Ou...
Olaf Weiss, Andreas Ziehe, Hanspeter Herzel
ICST
2010
IEEE
13 years 6 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
14 years 25 days ago
Rabbit: A New High-Performance Stream Cipher
Abstract. We present a new stream cipher, Rabbit, based on iterating a set of coupled nonlinear functions. Rabbit is characterized by a high performance in software with a measured...
Martin Boesgaard, Mette Vesterager, Thomas Pederse...