Sciweavers

1898 search results - page 40 / 380
» Weak Keys for IDEA
Sort
View
INDOCRYPT
2007
Springer
14 years 2 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
AAAI
1994
13 years 10 months ago
A Preference-Based Approach to Default Reasoning: Preliminary Report
An approach to nonmonotonic inference, based on preference orderings between possible worlds or states of affairs, is presented. We begin with an extant weak theory of default con...
James P. Delgrande
HCI
2009
13 years 6 months ago
Sign Language Recognition: Working with Limited Corpora
The availability of video format sign language corpora limited. This leads to a desire for techniques which do not rely on large, fully-labelled datasets. This paper covers various...
Helen Cooper, Richard Bowden
ACS
2011
13 years 3 months ago
Algebras of Higher Operads as Enriched Categories
Abstract. One of the open problems in higher category theory is the systematic construction of the higher dimensional analogues of the Gray tensor product. In this paper we begin t...
Michael Batanin, Mark Weber
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
13 years 10 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa