Sciweavers

6300 search results - page 177 / 1260
» We have it easy, but do we have it right
Sort
View
ICECCS
1995
IEEE
100views Hardware» more  ICECCS 1995»
15 years 5 months ago
POSD-a notation for presenting complex systems of processes
When trying to describe the behaviour of large systems, such as the business processes of large enterprises, we often adopt diagramming techniques based on derivatives of data flo...
Peter Henderson, Graham D. Pratten
FSE
1999
Springer
137views Cryptology» more  FSE 1999»
15 years 5 months ago
Linear Cryptanalysis of RC5 and RC6
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (blocksize 64) with 10 rou...
Johan Borst, Bart Preneel, Joos Vandewalle
IPL
2008
82views more  IPL 2008»
15 years 1 months ago
Confusion of memory
It is a truism that for a machine to have a useful access to memory or workspace, it must "know" where its input ends and its working memory begins. Most machine models ...
Lawrence S. Moss
SYNTHESE
2011
87views more  SYNTHESE 2011»
14 years 8 months ago
What will they say? - Public Announcement Games
Dynamic epistemic logics describe the epistemic consequences of actions. Public announcement logic, in particular, describe the consequences of public announcements. As such, thes...
Thomas Ågotnes, Hans P. van Ditmarsch
FC
2010
Springer
163views Cryptology» more  FC 2010»
15 years 5 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov