Sciweavers

4340 search results - page 244 / 868
» Formal Methods and Cryptography
Sort
View
TKDE
2012
227views Formal Methods» more  TKDE 2012»
13 years 7 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...
WWW
2004
ACM
16 years 5 months ago
TCOZ approach to semantic web services design
Complex Semantic Web (SW) services may have intricate data state, autonomous process behavior and concurrent interactions. The design of such SW service systems requires precise a...
Jin Song Dong, Yuan-Fang Li, Hai H. Wang
149
Voted
EUROCRYPT
2009
Springer
16 years 5 months ago
Cryptanalysis of MDC-2
We provide a collision attack and preimage attacks on the MDC-2 construction, which is a method (dating back to 1988) of turning an n-bit block cipher into a 2n-bit hash function. ...
Christian Rechberger, Florian Mendel, Lars R. Knud...
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
16 years 5 months ago
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
We have devised a frequency injection attack which is able to destroy the source of entropy in ring-oscillator-based true random number generators (TRNGs). A TRNG will lock to freq...
A. Theodore Markettos, Simon W. Moore
132
Voted
DCC
2008
IEEE
16 years 4 months ago
Explicit constructions for perfect hash families
Let k, v, t be integers such that k v t 2. A perfect hash family PHF(N; k, v, t) can be defined as an N ? k array with entries from a set of v symbols such that every N ?t suba...
Sosina Martirosyan, Tran van Trung