Sciweavers

1898 search results - page 44 / 380
» Weak Keys for IDEA
Sort
View
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 8 months ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li
FSS
2006
138views more  FSS 2006»
13 years 8 months ago
Fuzzy logics as the logics of chains
The paper proposes a formal delimitation of the class of `fuzzy logics' and answers some objections that can be raised against the definition; the focus is put on informal an...
Libor Behounek, Petr Cintula
JOC
1998
117views more  JOC 1998»
13 years 8 months ago
An Analysis of SAFER
We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z-module. In particular we consider the invariant Z-submodules ...
Sean Murphy
FLAIRS
2007
13 years 11 months ago
Learning Uncertain Rules with CONDORCKD
CONDORCKD is a system implementing a novel approach to discovering knowledge from data. It addresses the issue of relevance of the learned rules by algebraic means and explicitly ...
Jens Fisseler, Gabriele Kern-Isberner, Christoph B...
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 3 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...