We show the following two universality statements on the entry-ranges and Markov bases of spaces of 3-way contingency tables with fixed 2-margins: (1) For any finite set D of nonn...
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain ...
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...