Sciweavers

634 search results - page 22 / 127
» Groundwork for Weak Analysis
Sort
View
96
Voted
ACISP
2008
Springer
15 years 8 months ago
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Abstract. This paper presents a critical analysis of the AACS drivehost authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. I...
Jiayuan Sui, Douglas R. Stinson
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
15 years 7 months ago
Analysis of Involutional Ciphers: Khazad and Anubis
In this paper we study structural properties of SPN ciphers in which both the S-boxes and the affine layers are involutions. We apply our observations to the recently designed Rijn...
Alex Biryukov
ICRA
2010
IEEE
149views Robotics» more  ICRA 2010»
15 years 10 days ago
Observability analysis of relative localization for AUVs based on ranging and depth measurements
— The paper studies the observability properties of the relative localization of two Autonomous Underwater Vehicles (AUVs) equipped with depth sensors, linear/angular velocity se...
Gianluca Antonelli, Filippo Arrichiello, Stefano C...
INDOCRYPT
2003
Springer
15 years 7 months ago
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficie...
Souradyuti Paul, Bart Preneel
128
Voted
DAM
2006
79views more  DAM 2006»
15 years 1 months ago
A simple expected running time analysis for randomized "divide and conquer" algorithms
There are many randomized "divide and conquer" algorithms, such as randomized Quicksort, whose operation involves partitioning a problem of size n uniformly at random int...
Brian C. Dean