Sciweavers

1898 search results - page 119 / 380
» Weak Keys for IDEA
Sort
View
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
14 years 2 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
14 years 2 months ago
Understand Corporate Rationales for Engaging in Reverse Stock Splits - A Data Mining Application
There has been much written on the individual topics of bankruptcy prediction, corporate performance, and reverse stock splits. However, there is little research into the relation...
Melody Y. Kiang, Dorothy M. Fisher, Steve A. Fishe...
WACV
2005
IEEE
14 years 2 months ago
Semi-Supervised Self-Training of Object Detection Models
The construction of appearance-based object detection systems is time-consuming and difficult because a large number of training examples must be collected and manually labeled i...
Chuck Rosenberg, Martial Hebert, Henry Schneiderma...
DBISP2P
2005
Springer
82views Database» more  DBISP2P 2005»
14 years 2 months ago
Range Query Optimization Leveraging Peer Heterogeneity in DHT Data Networks
In this work we address the issue of efficient processing of range queries in DHT-based P2P data networks. The novelty of the proposed approach lies on architectures, algorithms, ...
Nikos Ntarmos, Theoni Pitoura, Peter Triantafillou
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
14 years 2 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir