Sciweavers

16 search results - page 2 / 4
» On Attacks on Filtering Generators Using Linear Subspace Str...
Sort
View
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
13 years 10 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...
KDD
2005
ACM
118views Data Mining» more  KDD 2005»
14 years 5 months ago
On the use of linear programming for unsupervised text classification
We propose a new algorithm for dimensionality reduction and unsupervised text classification. We use mixture models as underlying process of generating corpus and utilize a novel,...
Mark Sandler
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
CVPR
2009
IEEE
15 years 14 days ago
Learning General Optical Flow Subspaces for Egomotion Estimation and Detection of Motion Anomalies
This paper deals with estimation of dense optical flow and ego-motion in a generalized imaging system by exploiting probabilistic linear subspace constraints on the flow. We dea...
Richard Roberts (Georgia Institute of Technology),...
CGF
2008
103views more  CGF 2008»
13 years 5 months ago
Image-based Shaving
Many categories of objects, such as human faces, can be naturally viewed as a composition of several different layers. For example, a bearded face with glasses can be decomposed i...
Minh Hoai Nguyen, Jean-François Lalonde, Al...