Sciweavers

5119 search results - page 950 / 1024
» Security Privacy
Sort
View
MOC
2010
14 years 11 months ago
The structure of balanced multivariate biorthogonal multiwavelets and dual multiframelets
Abstract. Multiwavelets and multiframelets are of interest in several applications such as numerical algorithms and signal processing, due to their desirable properties such as hig...
Bin Han
MOC
2010
14 years 11 months ago
Portrait of the four regular super-exponentials to base sqrt(2)
We introduce the concept of regular super-functions at a fixed point. It is derived from the concept of regular iteration. A super-function F of h is a solution of F(z+1)=h(F(z)). ...
Dmitrii Kouznetsov, Henryk Trappmann
MOC
2010
14 years 11 months ago
The number field sieve for integers of low weight
We define the weight of an integer N to be the smallest w such that N can be represented as w i=1 i2ci , with 1,..., w{1,-1}. Since arithmetic modulo a prime of low weight is parti...
Oliver Schirokauer
ACSAC
2010
IEEE
14 years 8 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
ISPEC
2011
Springer
14 years 8 months ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu