Sciweavers

1898 search results - page 96 / 380
» Weak Keys for IDEA
Sort
View
FOCS
2007
IEEE
14 years 3 months ago
Strongly History-Independent Hashing with Applications
We present a strongly history independent (SHI) hash table that supports search in O(1) worst-case time, and insert and delete in O(1) expected time using O(n) data space. This ma...
Guy E. Blelloch, Daniel Golovin
AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
14 years 2 months ago
Applying Fujisaki-Okamoto to Identity-Based Encryption
The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), t...
Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka...
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
14 years 2 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 1 months ago
Prototype Implementations of an Architectural Model for Service-Based Flexible Software
The need to change software easily to meet evolving business requirements is urgent, and a radical shift is required in the development of software, with a more demand-centric vie...
Keith H. Bennett, Malcolm Munro, Jie Xu, Nicolas G...
ICFEM
2009
Springer
14 years 1 months ago
An Empirical Study of Structural Constraint Solving Techniques
Structural constraint solving allows finding object graphs that satisfy given constraints, thereby enabling software reliability tasks, such as systematic testing and error recove...
Junaid Haroon Siddiqui, Sarfraz Khurshid