Sciweavers

2446 search results - page 116 / 490
» Polyadic Concept Analysis
Sort
View
ICIC
2007
Springer
15 years 10 months ago
Analysis of Pi Series and Its Application to Image Encryption
Whether constant π (i.e., pi) is normal is a confusing problem without any strict theoretical demonstration except for some statistical proof. A new concept of pi series is introd...
Ting Chen, Feng Li
ISMAR
2006
IEEE
15 years 10 months ago
Performance analysis of an outdoor augmented reality tracking system that relies upon a few mobile beacons
We describe and evaluate a new tracking concept for outdoor Augmented Reality. A few mobile beacons added to the environment correct errors in head-worn inertial and GPS sensors. ...
Ronald Azuma, Howard Neely, Mike Daily, Jon Leonar...
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
15 years 9 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 9 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
15 years 9 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...