Sciweavers

1085 search results - page 139 / 217
» A Timing Attack on RC5
Sort
View
CCS
2006
ACM
15 years 1 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
ERSHOV
2006
Springer
14 years 12 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld
HIS
2008
14 years 11 months ago
Solving the Railway Traveling Salesman Problem via a Transformation into the Classical Traveling Salesman Problem
The Railway Traveling Salesman Problem (RTSP) is a practical extension of the classical traveling salesman problem considering a railway network and train schedules. We are given ...
Bin Hu, Günther R. Raidl
MSV
2004
14 years 11 months ago
Accurate Modeling and Simulation of Heart Tissue with GDEVS/Cell-DEVS
- We present a model describing the electrical behavior of the heart tissue. Previous research in this field have studied this problem using PDEs (Partial Differential Equations) a...
Gabriel A. Wainer, Norbert Giambiasi
TPDS
2010
256views more  TPDS 2010»
14 years 8 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du