Sciweavers

3486 search results - page 619 / 698
» On the Design and Security of RC2
Sort
View
EUROCRYPT
2005
Springer
15 years 4 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
INDOCRYPT
2005
Springer
15 years 4 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
71
Voted
OOPSLA
2005
Springer
15 years 4 months ago
PolyD: a flexible dispatching framework
The standard dispatching mechanisms built into programming languages are sometimes inadequate to the needs of the programmer. In the case of Java, the need for more flexibility h...
Antonio Cunei, Jan Vitek
93
Voted
OOPSLA
2005
Springer
15 years 4 months ago
Removing duplication from java.io: a case study using traits
Code duplication is a serious problem with no easy solution, even in industrial-strength code. Single inheritance cannot provide for effective code reuse in all situations, and s...
Emerson R. Murphy-Hill, Philip J. Quitslund, Andre...
90
Voted
OOPSLA
2005
Springer
15 years 4 months ago
A delta-driven execution model for semantic computing
We describe (and demonstrate) the execution model of a computing platform where computation is both incremental and data-driven. We call such an approach delta-driven. The platfor...
Roly Perera, Jeff Foster, György Koch