Sciweavers

167 search results - page 3 / 34
» ivs 2007
Sort
View
INDOCRYPT
2007
Springer
13 years 11 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
FSE
2007
Springer
87views Cryptology» more  FSE 2007»
13 years 11 months ago
On the Security of IV Dependent Stream Ciphers
CryptMT v3 is a stream cipher submitted to eStream project, and has entered the third evaluation phase. Any attack has not been found until now. In this paper, we mainly discuss th...
Côme Berbain, Henri Gilbert
AUTOMATICA
2005
89views more  AUTOMATICA 2005»
13 years 4 months ago
Instrumental variable methods for closed-loop system identification
In this paper, several instrumental variable (IV) and instrumental variable-related methods for closed-loop system identification are considered and set in an extended IV framewor...
Marion Gilson, Paul M. J. Van den Hof
BMCBI
2005
143views more  BMCBI 2005»
13 years 4 months ago
Evaluation of BioCreAtIvE assessment of task 2
Background: Molecular Biology accumulated substantial amounts of data concerning functions of genes and proteins. Information relating to functional descriptions is generally extr...
Christian Blaschke, Eduardo Andrés Le&oacut...
ICIP
2007
IEEE
13 years 11 months ago
Image Matting in the Framework of Quantification IV
Image matting and segmentation, which are used to extract a foreground object from the background, are primary techniques for digital image and video editing. In digital matting, ...
Takumi Kobayashi, Tadaaki Hosaka, Nobuyuki Otsu