Sciweavers

681 search results - page 29 / 137
» et 2006
Sort
View
ACSW
2007
14 years 11 months ago
A Range Test Secure in the Active Adversary Model
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficien...
Kun Peng, Ed Dawson
FSE
2006
Springer
101views Cryptology» more  FSE 2006»
15 years 1 months ago
Searching for Differential Paths in MD4
The ground-breaking results of Wang et al. have attracted a lot of attention to the collision resistance of hash functions. In their articles, Wang et al. give input differences, d...
Martin Schläffer, Elisabeth Oswald
DAGSTUHL
2006
14 years 11 months ago
Fault Jumping Attacks against Shrinking Generator
In this paper we outline two cryptoanalytic attacks against hardware implementation of the shrinking generator by Coppersmith et al., a classic design in low-cost, simple-design p...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wl...
ACL
2010
14 years 7 months ago
Towards Robust Multi-Tool Tagging. An OWL/DL-Based Approach
This paper describes a series of experiments to test the hypothesis that the parallel application of multiple NLP tools and the integration of their results improves the correctne...
Christian Chiarcos
ET
2006
72views more  ET 2006»
14 years 9 months ago
Optimization of Test/Diagnosis/Rework Location(s) and Characteristics in Electronic System Assembly
In this paper, an optimization methodology is used to select the locations and characteristics of test, diagnosis and rework operations in electronic systems assembly processes. Re...
Zhen Shi, Peter Sandborn