Sciweavers

502 search results - page 51 / 101
» Streaming Random Forests
Sort
View
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
14 years 1 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
ICMCS
2000
IEEE
122views Multimedia» more  ICMCS 2000»
14 years 1 months ago
Optimal Streaming of Layer-Encoded Multimedia Presentations
In the context of communication networks with no QoS guarantees, we describe the problem of streaming layer encoded multimedia presentation data as a two-phase decision problem. W...
David A. Turner, Keith W. Ross
IACR
2011
116views more  IACR 2011»
12 years 9 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
EGH
2010
Springer
13 years 8 months ago
GPU random numbers via the tiny encryption algorithm
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) a...
Fahad Zafar, Marc Olano, Aaron Curtis
IV
2010
IEEE
214views Visualization» more  IV 2010»
13 years 8 months ago
A System for Real-Time Transcoding and Delivery of Video to Smartphones
—This paper presents a report of a system that delivers customized video content to mobile devices. Constructed from open source components, it can stream transcoded video to mob...
Lior D. Shefer, Francis T. Marchese