Sciweavers

1898 search results - page 10 / 380
» Weak Keys for IDEA
Sort
View
LICS
1991
IEEE
14 years 3 days ago
Defaults and Revision in Structured Theories
Starting from a logic which speci es how to make deductions from a set of sentences (a ` at theory'), a way to generalise this toa partiallyordered bag ofsentences (a `struct...
Mark Ryan
ISW
2007
Springer
14 years 2 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel
AMC
2005
121views more  AMC 2005»
13 years 8 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
ESSLLI
1999
Springer
14 years 26 days ago
Weak Equivalence in Propositional Calculus
Abstract. The main purpose of this paper is to present a new algorithm (NEWSAT) for deciding the (un)satisfiability of propositional formulae. It is based on a somehow dual (versu...
Stefan Andrei
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 11 days ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko