Sciweavers

4 search results - page 1 / 1
» An Analysis of XSL Applied to BES
Sort
View
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
13 years 11 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
13 years 11 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo
DOCENG
2003
ACM
13 years 10 months ago
Lazy XSL transformations
We introduce a lazy XSLT interpreter that provides random access to the transformation result. This allows efficient pipelining of transformation sequences. Nodes of the result tr...
Steffen Schott, Markus L. Noga
GECCO
2000
Springer
13 years 8 months ago
Sampling Bias and Search Space Boundary Extension in Real Coded Genetic Algorithms
In Real coded genetic algorithms, some crossover operators do not work well on functions which have their optimum at the corner of the search space. To cope with this problem, we ...
Shigeyoshi Tsutsui