Sciweavers

2173 search results - page 106 / 435
» On the Values of Reducibility Candidates
Sort
View
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
15 years 1 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
DAS
2008
Springer
14 years 11 months ago
Symbol Descriptor Based on Shape Context and Vector Model of Information Retrieval
In this paper we present an adaptive method for graphic symbol representation based on shape contexts. The proposed descriptor is invariant under classical geometric transforms (r...
T.-O. Nguyen, Salvatore Tabbone, Oriol Ramos Terra...
ACL
2007
14 years 11 months ago
Sparse Information Extraction: Unsupervised Language Models to the Rescue
Even in a massive corpus such as the Web, a substantial fraction of extractions appear infrequently. This paper shows how to assess the correctness of sparse extractions by utiliz...
Doug Downey, Stefan Schoenmackers, Oren Etzioni
ICISC
2007
120views Cryptology» more  ICISC 2007»
14 years 11 months ago
Improving the Time Complexity of Matsui's Linear Cryptanalysis
This paper reports on an improvement of Matsui’s linear cryptanalysis that reduces the complexity of an attack with algorithm 2, by taking advantage of the Fast Fourier Transform...
Baudoin Collard, François-Xavier Standaert,...
ICISC
2007
117views Cryptology» more  ICISC 2007»
14 years 11 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo