In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Abstract. We describe the software architecture of a system for doing multiphysics simulation of a coupled fluid, thermal, and mechanical fracture problem. The system is organized...
L. Paul Chew, Nikos Chrisochoides, S. Gopalsamy, G...