Sciweavers

4103 search results - page 821 / 821
» Some results on the Collatz problem
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 2 days ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
COMPGEOM
2007
ACM
13 years 7 months ago
Between umbra and penumbra
Computing shadow boundaries is a difficult problem in the case of non-point light sources. A point is in the umbra if it does not see any part of any light source; it is in full l...
Julien Demouth, Olivier Devillers, Hazel Everett, ...
BMCBI
2010
100views more  BMCBI 2010»
13 years 5 months ago
MapMi: automated mapping of microRNA loci
Background: A large effort to discover microRNAs (miRNAs) has been under way. Currently miRBase is their primary repository, providing annotations of primary sequences, precursors...
José Afonso Guerra-Assunção, ...