Sciweavers

1898 search results - page 43 / 380
» Weak Keys for IDEA
Sort
View
ACS
2004
13 years 8 months ago
Categorical and Combinatorial Aspects of Descent Theory
There is a construction which lies at the heart of descent theory. The combinatorial aspects of this paper concern the description of the construction in all dimensions. The descr...
Ross Street
TCS
2010
13 years 7 months ago
Strong normalization property for second order linear logic
The paper contains the first complete proof of strong normalization (SN) for full second order linear logic (LL): Girard’s original proof uses a standardization theorem which i...
Michele Pagani, Lorenzo Tortora de Falco
JOC
2000
130views more  JOC 2000»
13 years 8 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
COMCOM
2010
129views more  COMCOM 2010»
13 years 8 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
IADIS
2003
13 years 10 months ago
Towards an Optimal Routing Strategy
The key features of the principal interior routing protocols for large systems are considered and compared, and the major weaknesses of the open standards noted. A proposal is giv...
Vic Grout