Sciweavers

4340 search results - page 173 / 868
» Formal Methods and Cryptography
Sort
View
FSE
2005
Springer
107views Cryptology» more  FSE 2005»
15 years 9 months ago
Small Scale Variants of the AES
In this paper we define small scale variants of the AES. These variants inherit the design features of the AES and provide a suitable framework for comparing different cryptanaly...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw

Publication
152views
15 years 7 months ago
Expected loss analysis of thresholded authentication protocols in noisy conditions
A number of authentication protocols have been proposed recently, where at least some part of the authentication is performed during a phase, lasting $n$ rounds, with no error corr...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
15 years 4 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
IACR
2011
91views more  IACR 2011»
14 years 3 months ago
Improved Generalized Birthday Attack
Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of Fr 2. The k-regular-decoding problem is to find a nonzero codeword consisting of w length...
Paul Kirchner
SIGSOFT
2001
ACM
16 years 5 months ago
Combining UML and formal notations for modelling real-time systems
This article explores a dual approach to real-time software development. Models are written in UML, as this is expected to be relatively easy and economic. Then models are automat...
Luigi Lavazza, Gabriele Quaroni, Matteo Venturelli