Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
In this paper, we consider periodic linear systems driven by T0-periodic signals that we desire to reconstruct. The systems under consideration are of the form ˙x =A(t)x +A0(t)w(...
Jonathan Chauvin, Gilles Corde, Nicolas Petit, Pie...
We present a method for testing subject’s performance in a realistic (end-to-end) information understanding task— rapid understanding of large document collections—and discu...
Dynamically discovering likely program invariants from concrete test executions has emerged as a highly promising software engineering technique. Dynamic invariant inference has t...
Christoph Csallner, Nikolai Tillmann, Yannis Smara...
Abstract We consider the problem of coordinating the operations of two supply chain partners: a foreign shipping company and a domestic port. The two partners have conflicting busi...