Sciweavers

66 search results - page 5 / 14
» aes 2005
Sort
View
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
14 years 4 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo
AE
2005
Springer
14 years 3 months ago
An Exponential Representation in the API Algorithm for Hidden Markov Models Training
In this paper, we show how an efficient ant based algorithm, called API and initially designed to perform real parameter optimization, can be adapted to the difficult problem of Hi...
Sebastien Aupetit, Nicolas Monmarché, Moham...
AE
2005
Springer
14 years 3 months ago
Algorithmic Self-assembly by Accretion and by Carving in MGS
Abstract. We report the use of MGS, a declarative and rule-based language, for the modeling of various self-assembly processes. The approach is illustrated on the fabrication of a ...
Antoine Spicher, Olivier Michel, Jean-Louis Giavit...
ASIACRYPT
2005
Springer
14 years 3 months ago
An Analysis of the XSL Algorithm
The XSL “algorithm” is a method for solving systems of multivariate polynomial equations based on the linearization method. It was proposed in 2002 as a dedicated method for ex...
Carlos Cid, Gaëtan Leurent
ICAC
2005
IEEE
14 years 3 months ago
Resource Allocation for Autonomic Data Centers using Analytic Performance Models
Large data centers host several application environments (AEs) that are subject to workloads whose intensity varies widely and unpredictably. Therefore, the servers of the data ce...
Mohamed N. Bennani, Daniel A. Menascé