Sciweavers

13214 search results - page 4 / 2643
» Pseudorandomness for network algorithms
Sort
View
79
Voted
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 3 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
STOC
1997
ACM
91views Algorithms» more  STOC 1997»
15 years 1 months ago
Approximating Hyper-Rectangles: Learning and Pseudo-Random Sets
Peter Auer, Philip M. Long, Aravind Srinivasan
APPROX
2010
Springer
120views Algorithms» more  APPROX 2010»
14 years 11 months ago
Improved Pseudorandom Generators for Depth 2 Circuits
Anindya De, Omid Etesami, Luca Trevisan, Madhur Tu...
87
Voted
LCN
2002
IEEE
15 years 2 months ago
A Novel Approach to the Estimation of the Hurst Parameter in Self-Similar Traffic
We present a new method to estimate the Hurst parameter of the increment process in network traffic – a process that is assumed to be self-similar. The confidence intervals an...
Houssain Kettani, John A. Gubner