Sciweavers

4285 search results - page 101 / 857
» Differential Behavioral Analysis
Sort
View
142
Voted
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
15 years 12 months ago
Accurate Estimation of the Degree Distribution of Private Networks
—We describe an efficient algorithm for releasing a provably private estimate of the degree distribution of a network. The algorithm satisfies a rigorous property of differenti...
Michael Hay, Chao Li, Gerome Miklau, David Jensen
ICIP
1994
IEEE
15 years 9 months ago
Analyzing and Synthesizing Images by Evolving Curves
Abstract. Numerical analysis of conservation laws plays an important role in the implementation of curve evolution equations. This paper reviews the relevant concepts in numerical ...
Alfred M. Bruckstein
170
Voted
ACISP
2010
Springer
15 years 6 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...
ASIACRYPT
2009
Springer
15 years 12 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...
HASE
1997
IEEE
15 years 9 months ago
Verifying Fault-Tolerant Behavior of State Machines
Fault-tolerant behavior is an important non-functional requirement for systems that involve high criticality. We present a framework which allows the analysis of faulttolerant beh...
Mario Dal Cin