Sciweavers

12 search results - page 2 / 3
» New Distinguishing Attack on MAC Using Secret-Prefix Method
Sort
View
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 24 days ago
Subspace LWE
The (decisional) learning with errors problem (LWE) asks to distinguish “noisy” inner products of a secret vector with random vectors from uniform. In recent years, the LWE pro...
Krzysztof Pietrzak
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 5 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
13 years 10 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin
KBSE
2007
IEEE
13 years 11 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald
CVBIA
2005
Springer
13 years 10 months ago
A New Coarse-to-Fine Framework for 3D Brain MR Image Registration
Registration, that is, the alignment of multiple images, has been one of the most challenging problems in the field of computer vision. It also serves as an important role in biome...
Terrence Chen, Thomas S. Huang, Wotao Yin, Xiang S...