Sciweavers

347 search results - page 2 / 70
» The Berlekamp-Massey Algorithm revisited
Sort
View
FSE
2004
Springer
155views Cryptology» more  FSE 2004»
14 years 4 months ago
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obt...
Joo Yeon Cho, Josef Pieprzyk
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 11 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
14 years 4 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
TEC
2010
184views more  TEC 2010»
13 years 5 months ago
Automatic Reproduction of a Genius Algorithm: Strassen's Algorithm Revisited by Genetic Search
Abstract--In 1968, Volker Strassen, a young German mathematician, announced a clever algorithm to reduce the asymptotic complexity of n
Seunghyun Oh, Byung-Ro Moon
ACL
2010
13 years 9 months ago
SVD and Clustering for Unsupervised POS Tagging
We revisit the algorithm of Sch
Michael Lamar, Yariv Maron, Mark Johnson, Elie Bie...