Sciweavers

1898 search results - page 40 / 380
» Weak Keys for IDEA
Sort
View
112
Voted
INDOCRYPT
2007
Springer
15 years 9 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
113
Voted
AAAI
1994
15 years 4 months ago
A Preference-Based Approach to Default Reasoning: Preliminary Report
An approach to nonmonotonic inference, based on preference orderings between possible worlds or states of affairs, is presented. We begin with an extant weak theory of default con...
James P. Delgrande
123
Voted
HCI
2009
15 years 1 months ago
Sign Language Recognition: Working with Limited Corpora
The availability of video format sign language corpora limited. This leads to a desire for techniques which do not rely on large, fully-labelled datasets. This paper covers various...
Helen Cooper, Richard Bowden
ACS
2011
14 years 10 months ago
Algebras of Higher Operads as Enriched Categories
Abstract. One of the open problems in higher category theory is the systematic construction of the higher dimensional analogues of the Gray tensor product. In this paper we begin t...
Michael Batanin, Mark Weber
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 5 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa