This paper presents two key-recovery attacks against the last modication to Achterbahn-128/80 proposed by the authors at SASC 2007 due to the previous attacks. The 80-bit variant,...
Understanding three simultaneous speeches is proposed as a challenge problem to foster artificial intelligence, speech and sound understanding or recognition, and computational au...
Hiroshi G. Okuno, Tomohiro Nakatani, Takeshi Kawab...
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
This paper presents a model for watermarking and some attacks on watermarks. Given the watermarked signal, the so-called Wiener attack performs minimum mean-squared error (MMSE) es...