Sciweavers

82 search results - page 13 / 17
» ae 2007
Sort
View
AES
2007
Springer
75views Cryptology» more  AES 2007»
13 years 7 months ago
Improved FVM for two-layer shallow-water models: Application to the Strait of Gibraltar
This paper deals with the numerical simulation of flows of stratified fluids through channels with irregular geometry. Channel crosssections are supposed to be symmetric but no...
Manuel Jose Castro Díaz, José A. Gar...
DAGSTUHL
2007
13 years 9 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
IMC
2007
ACM
13 years 9 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
DGO
2004
118views Education» more  DGO 2004»
13 years 9 months ago
Human-Centered Systems for Business Services
The focus of this paper reports a collaborative effort with the State of New Jersey in designing and building a human-centered e-government portal to support small and medium size...
Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun
DICTA
2007
13 years 9 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran