Sciweavers

3898 search results - page 33 / 780
» On the Bit Extraction Problem
Sort
View
IJON
1998
82views more  IJON 1998»
14 years 9 months ago
Solving arithmetic problems using feed-forward neural networks
We design new feed-forward multi-layered neural networks which perform di erent elementary arithmetic operations, such as bit shifting, addition of N p-bit numbers, and multiplica...
Leonardo Franco, Sergio A. Cannas
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
FOCS
2002
IEEE
15 years 2 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 4 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
KIVS
2005
Springer
15 years 3 months ago
Revenue Maximisation in Peer-to-Peer Networks
: BitTorrent is a peer-to-peer (p2p) protocol for file-sharing. Its improvement over other file-sharing protocols is its tit-for-tat strategy to decide to whom a peer should uplo...
Kolja Eger, Ulrich Killat