Sciweavers

337 search results - page 48 / 68
» Statistical Disclosure Attacks
Sort
View
RECOMB
2005
Springer
14 years 8 months ago
A Practical Approach to Significance Assessment in Alignment with Gaps
Abstract. Current numerical methods for assessing the statistical significance of local alignments with gaps are time consuming. Analytical solutions thus far have been limited to ...
Nicholas Chia, Ralf Bundschuh
SACRYPT
2009
Springer
147views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
A New Approach for FCSRs
The Feedback with Carry Shift Registers (FCSRs) have been proposed as an alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. FCSRs have good st...
François Arnault, Thierry P. Berger, C&eacu...
DCC
2011
IEEE
13 years 3 months ago
Accurate estimates of the data complexity and success probability for various cryptanalyses
Abstract Many attacks on encryption schemes rely on statistical considerations using plaintext/ciphertext pairs to find some information on the key. We provide here simple formula...
Céline Blondeau, Benoît Gérard...
FSE
2007
Springer
263views Cryptology» more  FSE 2007»
14 years 2 months ago
Bad and Good Ways of Post-processing Biased Physical Random Numbers
Algorithmic post-processing is used to overcome statistical deficiencies of physical random number generators. We show that the quasigroup based approach for post-processing rando...
Markus Dichtl
VLDB
2007
ACM
139views Database» more  VLDB 2007»
14 years 2 months ago
A Bayesian Method for Guessing the Extreme Values in a Data Set
For a large number of data management problems, it would be very useful to be able to obtain a few samples from a data set, and to use the samples to guess the largest (or smalles...
Mingxi Wu, Chris Jermaine