Sciweavers

16 search results - page 3 / 4
» An Extended DES
Sort
View
99
Voted
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
15 years 4 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
AAMAS
2007
Springer
15 years 17 days ago
Local strategy learning in networked multi-agent team formation
Abstract. Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply cha...
Blazej Bulka, Matthew E. Gaston, Marie desJardins
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 4 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
PODC
2010
ACM
15 years 4 months ago
The multiplicative power of consensus numbers
: The Borowsky-Gafni (BG) simulation algorithm is a powerful reduction algorithm that shows that t-resilience of decision tasks can be fully characterized in terms of wait-freedom....
Damien Imbs, Michel Raynal
79
Voted
DGCI
2005
Springer
15 years 6 months ago
Generalized Functionality for Arithmetic Discrete Planes
Naive discrete planes are well known to be functional on a coordinate plane. The aim of our paper is to extend the functionality concept to a larger family of arithmetic discrete ...
Valérie Berthé, Christophe Fiorio, D...