Sciweavers

373 search results - page 32 / 75
» Two Attacks on Reduced IDEA
Sort
View
DEXA
1999
Springer
158views Database» more  DEXA 1999»
13 years 12 months ago
Transaction Shipping Approach for Mobile Distributed Real-Time Databases
Due to the unpredictability of mobile network, it is difficult to meet transaction deadlines in a mobile distributed real-time database system (MDRDTBS). We propose the idea of tra...
Kam-yiu Lam, Tei-Wei Kuo, Wai-Hung Tsang, Gary C. ...
SIGGRAPH
2010
ACM
13 years 11 months ago
A wave-based anisotropic quadrangulation method
This paper proposes a new method for remeshing a surface into anisotropically sized quads. The basic idea is to construct a special standing wave on the surface to generate the gl...
Muyang Zhang, Jin Huang, Xinguo Liu, Hujun Bao
EUROCRYPT
2007
Springer
14 years 1 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
TNC
2004
120views Education» more  TNC 2004»
13 years 9 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
EUROCRYPT
2010
Springer
14 years 14 days ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...