Sciweavers

55 search results - page 10 / 11
» LILI Keystream Generator
Sort
View
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 7 days ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciï¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
13 years 11 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 6 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
CSIE
2009
IEEE
13 years 10 months ago
K-Means on Commodity GPUs with CUDA
K-means algorithm is one of the most famous unsupervised clustering algorithms. Many theoretical improvements for the performance of original algorithms have been put forward, whi...
Hong-tao Bai, Li-li He, Dan-tong Ouyang, Zhan-shan...
JMIV
2006
176views more  JMIV 2006»
13 years 5 months ago
Centroidal Voronoi Tessellation Algorithms for Image Compression, Segmentation, and Multichannel Restoration
Centroidal Voronoi tessellations (CVT's) are special Voronoi tessellations for which the generators of the tessellation are also the centers of mass (or means) of the Voronoi ...
Qiang Du, Max Gunzburger, Lili Ju, Xiaoqiang Wang