Search
Now showing items 1-10 of 1380
A Survey on How to Break Hash Functions
Year: 2008
Abstract:
and Yu which proposed to break hash function family using a kind of precise modular differential attack, which unlike most differential attack uses the difference in term of integer modular subtraction and had efficiently find collisions of MD4 in less...
Management Patterns for Smart Grid Resilience
Publisher: IEEE
Year: 2014
Definition of an embedded driver model for driving behavior prediction within the DESERVE platform
Publisher: IEEE
Year: 2014
Ray Tracing propagation modelling: Future prospects
Publisher: IEEE
Year: 2014
E2MAC: An Energy-Efficient MAC protocol for wireless sensor networks
Publisher: IEEE
Year: 2014
Radar target recognition using dynamic system model
Publisher: IEEE
Year: 2014
Creative Computing Processes: Musical Composition
Publisher: IEEE
Year: 2014