Sciweavers

ISW
1997
Springer
14 years 24 days ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel
ISW
1997
Springer
14 years 24 days ago
A High-Speed Small RSA Encryption LSI with Low Power Dissipation
Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki O...
ISW
1997
Springer
14 years 24 days ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
ISW
1997
Springer
14 years 24 days ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
ISW
1997
Springer
14 years 24 days ago
High-Speed Cryptography
George I. Davida, René Peralta
IDA
1997
Springer
14 years 24 days ago
Data Analysis for Query Processing
Jerome Robinson, Barry G. T. Lowden
IDA
1997
Springer
14 years 24 days ago
How to Find Big-Oh in Your Data Set (and How Not to)
The empirical curve bounding problem is de ned as follows. Suppose data vectors X Y are presented such that E(Y i]) = f(X i]) where f(x) is an unknown function. The problem is to a...
Catherine C. McGeoch, Doina Precup, Paul R. Cohen
IDA
1997
Springer
14 years 24 days ago
Building Simple Models: A Case Study with Decision Trees
David Jensen, Tim Oates, Paul R. Cohen
IDA
1997
Springer
14 years 24 days ago
Network Performance Assessment for Neurofuzzy Data Modelling
This paper evaluates the performance of ten significance measures applied to the problem of determining an appropriate network structure, for data modelling with neurofuzzy syste...
Steve R. Gunn, Martin Brown, Kev M. Bossley
EKAW
1997
Springer
14 years 24 days ago
The Notion of Role in Conceptual Modeling
: In this article we analyse the notion of knowledge role. First of all, we present how the relationship between problem solving methods and domain models is tackled in different a...
Chantal Reynaud, Nathalie Aussenac-Gilles, Pierre ...