Sciweavers

3996 search results - page 96 / 800
» A Publish
Sort
View
INDOCRYPT
2007
Springer
15 years 6 months ago
A Meet-in-the-Middle Collision Attack Against the New FORK-256
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to existing published FORK-256 cryptanalysis work, yet ...
Markku-Juhani Olavi Saarinen
PAISI
2007
Springer
15 years 6 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
PDCAT
2007
Springer
15 years 6 months ago
High Throughput Multi-port MT19937 Uniform Random Number Generator
ct There have been many previous attempts to accelerate MT19937 using FPGAs but we believe that we can substantially improve the previous implementations to develop a higher throug...
Vinay Sriram, David Kearney
ACSC
2006
IEEE
15 years 6 months ago
Approximative filtering of XML documents in a publish/subscribe system
Publish/subscribe systems filter published documents and inform their subscribers about documents matching their interests. Recent systems have focussed on documents or messages ...
Annika Hinze, Yann Michel, Torsten Schlieder
AICT
2006
IEEE
122views Communications» more  AICT 2006»
15 years 6 months ago
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
A peer-to-peer file sharing system includes a lookup and a content distribution protocol. Very efficient peer-to-peer protocols exist for content distribution, but efficient in...
Anh-Tuan Gai, Laurent Viennot