Sciweavers

5722 search results - page 444 / 1145
» Security Function Interactions
Sort
View
103
Voted
TROB
2008
102views more  TROB 2008»
15 years 4 months ago
Experimentally Verified Optimal Serpentine Gait and Hyperredundancy of a Rigid-Link Snake Robot
In this study, we examine, for a six-link snake robot, how an optimal gait might change as a function of the snake
Vipul Mehta, Sean Brennan, Farhan Gandhi
TEC
2010
121views more  TEC 2010»
14 years 11 months ago
Brain-Computer Evolutionary Multiobjective Optimization: A Genetic Algorithm Adapting to the Decision Maker
The centrality of the decision maker (DM) is widely recognized in the multiple criteria decision-making community. This translates into emphasis on seamless human
Roberto Battiti, Andrea Passerini
FSE
2001
Springer
121views Cryptology» more  FSE 2001»
15 years 9 months ago
Producing Collisions for PANAMA
PANAMA is a cryptographic module that was presented at the FSE Workshop in ’98 by Joan Daemen and Craig Clapp. It can serve both as a stream cipher and as a cryptographic hash fu...
Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joo...
CARDIS
1998
Springer
110views Hardware» more  CARDIS 1998»
15 years 8 months ago
Reducing the Collision Probability of Alleged Comp128
Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
Helena Handschuh, Pascal Paillier
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
15 years 7 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...