Sciweavers

172 search results - page 15 / 35
» Key agreement from weak bit agreement
Sort
View
CORR
2002
Springer
79views Education» more  CORR 2002»
14 years 9 months ago
Technical Note: Bias and the Quantification of Stability
Research on bias in machine learning algorithms has generally been concerned with the impact of bias on predictive accuracy. We believe that there are other factors that should al...
Peter D. Turney
SEKE
2009
Springer
15 years 2 months ago
Improving Negotiations through Fuzzy Cognitive Maps
In a decision-making process, a systematic method to manage and measure negotiation aspects provides crucial information to negotiators and has emerged as a key factor to determin...
Sérgio Assis Rodrigues, Tiago Santos da Sil...
ISW
2007
Springer
15 years 3 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 3 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
CORR
2004
Springer
107views Education» more  CORR 2004»
14 years 9 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...