Sciweavers

4767 search results - page 751 / 954
» Structures for Abstract Rewriting
Sort
View
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 2 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
SEAAI
1998
Springer
14 years 2 months ago
On theoretical backgrounds of CAD
Abstract. In the past, some information technologies (IT) have quickly been adopted by the engineering practice while the implementation of others has been slower. In the paper, th...
Ziga Turk
CHI
1997
ACM
14 years 2 months ago
A Prototype Design Tool for Participants in Graphical Multiuser Environments
d in Extended Abstracts, Human Factors in Computing Systems (CHI conference proceedings), Association for Computing Machinery, 1997, pp. 246-247. Originally appeared as Working Pap...
Carol Strohecker, Barbara Barros
DAC
1997
ACM
14 years 2 months ago
System Level Fixed-Point Design Based on an Interpolative Approach
The design process for xed-point implementations either in software or in hardware requires a bit-true speci cation of the algorithm in order to analyze quantization e ects on an...
Markus Willems, Volker Bürsgens, Holger Kedin...
SIGCOMM
1997
ACM
14 years 2 months ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo