Sciweavers

347 search results - page 2 / 70
» The Berlekamp-Massey Algorithm revisited
Sort
View
FSE
2004
Springer
155views Cryptology» more  FSE 2004»
13 years 10 months ago
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obt...
Joo Yeon Cho, Josef Pieprzyk
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 5 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
13 years 11 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
TEC
2010
184views more  TEC 2010»
13 years 1 days ago
Automatic Reproduction of a Genius Algorithm: Strassen's Algorithm Revisited by Genetic Search
Abstract--In 1968, Volker Strassen, a young German mathematician, announced a clever algorithm to reduce the asymptotic complexity of n
Seunghyun Oh, Byung-Ro Moon
ACL
2010
13 years 3 months ago
SVD and Clustering for Unsupervised POS Tagging
We revisit the algorithm of Sch
Michael Lamar, Yariv Maron, Mark Johnson, Elie Bie...