Sciweavers

Share
5 search results - page 1 / 1
» Some Words About Cryptographic Key Recognition In Data Strea...
Sort
View
IACR
2011
116views more  IACR 2011»
7 years 4 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
AES
2004
Springer
151views Cryptology» more  AES 2004»
8 years 10 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
ECOI
2010
117views more  ECOI 2010»
8 years 5 months ago
Ensemble extraction for classification and detection of bird species
Advances in technology have enabled new approaches for sensing the environment and collecting data about the world. Once collected, sensor readings can be assembled into data stre...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
IQ
2004
8 years 6 months ago
An Algebraic Approach to Quality Metrics for Customer Recognition Systems
: Success in implementing a Customer Relationship Management (CRM) system requires close attention to data quality issues. However, most of the literature focuses on the quality of...
John R. Talburt, Kimberly Hess, Richard Wang, Emil...
STOC
2000
ACM
174views Algorithms» more  STOC 2000»
8 years 9 months ago
Noise-tolerant learning, the parity problem, and the statistical query model
We describe a slightly subexponential time algorithm for learning parity functions in the presence of random classiļ¬cation noise, a problem closely related to several cryptograph...
Avrim Blum, Adam Kalai, Hal Wasserman
books