Sciweavers

12373 search results - page 2274 / 2475
» Semi-Logarithmic Number Systems
Sort
View
EUROCRYPT
1997
Springer
15 years 8 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
VVS
1996
IEEE
205views Visualization» more  VVS 1996»
15 years 8 months ago
3D Shock Wave Visualization on Unstructured Grids
A critical issue in understanding high speed flows is the study of shock waves. This paper summarizes our research on techniques for the detection and visualization of shock waves...
Kwan-Liu Ma, John Van Rosendale, Willem Vermeer
CSCW
1996
ACM
15 years 8 months ago
Talking to Strangers: An Evaluation of the Factors Affecting Electronic Collaboration
This empirical study examines factors influencing the success of a commercial groupware system in creating group archives and supporting asynchronous communication. The study inve...
Steve Whittaker
DAC
1996
ACM
15 years 8 months ago
Methodology and Tools for State Encoding in Asynchronous Circuit Synthesis
This paper proposes a state encoding method for asynchronous circuits based on the theory of regions. A region in a Transition System is a set of states that "behave uniforml...
Jordi Cortadella, Michael Kishinevsky, Alex Kondra...
« Prev « First page 2274 / 2475 Last » Next »