Sciweavers

375 search results - page 43 / 75
» Making Abstract Machines Less Abstract
Sort
View
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 2 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
59
Voted
CRYPTO
2006
Springer
107views Cryptology» more  CRYPTO 2006»
15 years 2 months ago
Cryptanalysis of 2R- Schemes
Abstract. In this paper, we study the security of 2Rschemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n p...
Jean-Charles Faugère, Ludovic Perret
71
Voted
ERSHOV
2006
Springer
15 years 2 months ago
On the Importance of Parameter Tuning in Text Categorization
Abstract. Text Categorization algorithms have a large number of parameters that determine their behaviour, whose effect is not easily predicted objectively or intuitively and may v...
Cornelis H. A. Koster, Jean Beney
HIPEAC
2010
Springer
15 years 13 days ago
Virtual Ways: Efficient Coherence for Architecturally Visible Storage in Automatic Instruction Set Extensions
Abstract. Customizable processors augmented with application-specific Instruction Set Extensions (ISEs) have begun to gain traction in recent years. The most effective ISEs include...
Theo Kluter, Samuel Burri, Philip Brisk, Edoardo C...
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 8 days ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel