Sciweavers

IACR
2011
243views more  IACR 2011»
12 years 10 months ago
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers
The block cipher family for lightweight devices, KTANTAN, is analyzed in this paper. We propose a new cryptanalysis method which improves results of Meet-in-the-Middle attacks on K...
Bo Zhu, Guang Gong
ESA
2011
Springer
269views Algorithms» more  ESA 2011»
12 years 10 months ago
Alphabet-Independent Compressed Text Indexing
Self-indexes can represent a text in asymptotically optimal space under the k-th order entropy model, give access to text substrings, and support indexed pattern searches. Their ti...
Djamal Belazzougui, Gonzalo Navarro
PRL
2008
88views more  PRL 2008»
13 years 10 months ago
Time-efficient spam e-mail filtering using n-gram models
In this paper, we propose spam e-mail filtering methods having high accuracies and low time complexities. The methods are based on the n-gram approach and a heuristics which is re...
Ali Çiltik, Tunga Güngör
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 2 months ago
Related-Key Impossible Differential Attacks on 8-Round AES-192
In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional obs...
Eli Biham, Orr Dunkelman, Nathan Keller
EGPGV
2004
Springer
165views Visualization» more  EGPGV 2004»
14 years 4 months ago
Tuning of Algorithms for Independent Task Placement in the Context of Demand-Driven Parallel Ray Tracing
This paper investigates assignment strategies (load balancing algorithms) for process farms which solve the problem of online placement of a constant number of independent tasks w...
Tomas Plachetka
NLDB
2007
Springer
14 years 5 months ago
Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages
In this paper, we propose methods and heuristics having high accuracies and low time complexities for filtering spam e-mails. The methods are based on the n-gram approach and a heu...
Tunga Güngör, Ali Çiltik