Sciweavers

16 search results - page 1 / 4
» A New Class of Weak Keys for Blowfish
Sort
View
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
13 years 8 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
DC
1999
13 years 4 months ago
A Simple and Fast Asynchronous Consensus Protocol Based on a Weak Failure Detector
or fault-tolerant asynchronous systems. It abstracts a family of problems known as Agreement (or Coordination) problems. Any solution to consensus can serve as a basic building blo...
Michel Hurfin, Michel Raynal
GC
2008
Springer
13 years 4 months ago
Laplacian Spectrum of Weakly Quasi-threshold Graphs
In this paper we study the class of weakly quasi-threshold graphs that are obtained from a vertex by recursively applying the operations (i) adding a new isolated vertex, (ii) addi...
R. B. Bapat, A. K. Lal, Sukanta Pati
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
13 years 11 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
JUCS
2008
147views more  JUCS 2008»
13 years 4 months ago
On BCK Algebras - Part I.b: An Attempt to Treat Unitarily the Algebras of Logic. New Algebras
: Since all the algebras connected to logic have, more or less explicitely, an associated order relation, it follows that they have two presentations, dual to each other. We classi...
Afrodita Iorgulescu