Sciweavers

54 search results - page 2 / 11
» On Generating the Initial Key in the Bounded-Storage Model
Sort
View
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
13 years 9 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
ICIC
2009
Springer
13 years 3 months ago
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
IEEE recently standardized 802.21-2008 Media Independent Handover (MIH) standard. MIH is a key milestone toward the evolution of integrated heterogeneous 4G wireless networks. MIH ...
Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Q...
ASIACRYPT
2009
Springer
13 years 12 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
BRAIN
2010
Springer
13 years 2 months ago
Domain-Specific Modeling as a Pragmatic Approach to Neuronal Model Descriptions
Biologically realistic modeling has been greatly facilitated by the development of neuro-simulators, and the development of simulatorindependent formats for model exchange is the s...
Ralf Ansorg, Lars Schwabe
EMNLP
2008
13 years 6 months ago
Seed and Grow: Augmenting Statistically Generated Summary Sentences using Schematic Word Patterns
We examine the problem of content selection in statistical novel sentence generation. Our approach models the processes performed by professional editors when incorporating materi...
Stephen Wan, Robert Dale, Mark Dras, Cécile...