Sciweavers

1898 search results - page 45 / 380
» Weak Keys for IDEA
Sort
View
116
Voted
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
15 years 7 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
85
Voted
IJCAI
2003
15 years 5 months ago
Automated Verification: Graphs, Logic, and Automata
Automated verification is one of the most success­ ful applications of automated reasoning in com­ puter science. In automated verification one uses algorithmic techniques to es...
Moshe Y. Vardi
125
Voted
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 3 months ago
libtissue - implementing innate immunity
In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial immune systems (AISs) and presented an outline for a conceptual framewo...
Jamie Twycross, Uwe Aickelin
115
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 2 months ago
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
— We consider perfect secret key generation for a “pairwise independent network” model in which every pair of terminals share a random binary string, with the strings shared ...
Sirin Nitinawarat, Prakash Narayan
128
Voted
IH
1999
Springer
15 years 7 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel