Sciweavers

IJISEC
2016
67views more  IJISEC 2016»
10 years 1 months ago
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and de...
Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nico...
IJISEC
2016
49views more  IJISEC 2016»
10 years 1 months ago
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...
Yu Chen, Qiong Huang, Zongyang Zhang
IJIS
2016
59views more  IJIS 2016»
10 years 1 months ago
Need for Data Processing Naturally Leads to Fuzzy Logic (and Neural Networks): Fuzzy Beyond Experts and Beyond Probabilities
Fuzzy techniques have been originally designed to describe imprecise (“fuzzy”) expert knowledge. Somewhat surprisingly, fuzzy techniques have also been successfully used in si...
Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboon...
IJINFOMAN
2016
50views more  IJINFOMAN 2016»
10 years 1 months ago
A resiliency framework for an enterprise cloud
Victor Chang, Muthu Ramachandran, Yulin Yao, Yen-H...