Sciweavers

762 search results - page 1 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
ASIACRYPT
2006
Springer
13 years 8 months ago
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we...
Christophe De Cannière, Christian Rechberge...
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
13 years 6 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CSCW
2010
ACM
14 years 1 months ago
Characteristics of shared health reflections in a local community
We performed a content analysis of the information shared in a locally and culturally focused health application, EatWell. In EatWell, information is shared via the creation of au...
Andrea Grimes, Brian M. Landry, Rebecca E. Grinter
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 5 months ago
Characteristic relational patterns
Research in relational data mining has two major directions: finding global models of a relational database and the discovery of local relational patterns within a database. While...
Arne Koopman, Arno Siebes
WEBI
2005
Springer
13 years 10 months ago
Standardized Evaluation Method for Web Clustering Results
Finding a set of web pages relevant to a user’s information goal is difficult due to the enormous size of the Internet. Search engines are able to find a set of pages that mat...
Daniel Crabtree, Xiaoying Gao, Peter Andreae