Sciweavers

FSE
2006
Springer
99views Cryptology» more  FSE 2006»
15 years 7 months ago
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone o...
Matthias Krause, Dirk Stegemann
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
15 years 7 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 7 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
124
Voted
FQAS
2006
Springer
106views Database» more  FQAS 2006»
15 years 7 months ago
A Functional Model for Data Analysis
We present a functional model for the analysis of large volumes of detailed transactional data, accumulated over time. In our model, the data schema is an acyclic graph with a sing...
Nicolas Spyratos
FQAS
2006
Springer
120views Database» more  FQAS 2006»
15 years 7 months ago
Question Answering with Imperfect Temporal Information
Abstract. A temporal question answering system must be able to deduce which qualitative temporal relation holds between two events, a reasoning task that is complicated by the fact...
Steven Schockaert, David Ahn, Martine De Cock, Eti...