Results 1  10
of
115
MovetoFront, Distance Coding, and Inversion Frequencies Revisited
, 2007
"... MovetoFront, Distance Coding and Inversion Frequencies are three somewhat related techniques used to process the output of the BurrowsWheeler Transform. In this paper we analyze these techniques from the point of view of how effective they are in the task of compressing lowentropy strings, that ..."
Abstract

Cited by 5 (1 self)
 Add to MetaCart
MovetoFront, Distance Coding and Inversion Frequencies are three somewhat related techniques used to process the output of the BurrowsWheeler Transform. In this paper we analyze these techniques from the point of view of how effective they are in the task of compressing lowentropy strings
A Challenging But Feasible BlockwiseAdaptive ChosenPlaintext Attack on SSL
 SECRYPT 2006, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SET'UBAL
, 2006
"... This paper introduces a chosenplaintext vulnerability in the Secure Sockets Layer (SSL) and Trasport Layer Security (TLS) protocols which enables recovery of low entropy strings such as can be guessed from a likely set of 21000 options. SSL and TLS are widely used for securing communication ove ..."
Abstract

Cited by 21 (1 self)
 Add to MetaCart
This paper introduces a chosenplaintext vulnerability in the Secure Sockets Layer (SSL) and Trasport Layer Security (TLS) protocols which enables recovery of low entropy strings such as can be guessed from a likely set of 21000 options. SSL and TLS are widely used for securing communication
Vulnerability of SSL to ChosenPlaintext Attack
, 2004
"... The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode of encryption which requires an initialization vector (IV) in order to encryp ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
of the immediatelypreceding message. We show that this introduces a vulnerability in SSL which (potentially) enables easy recovery of lowentropy strings such as passwords or PINs that have been encrypted. Moreover, we argue that the open nature of web browsers provides a feasible "point of entry
Passwordauthenticated key exchange using efficient MACs
"... Abstract — This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way of choosing a password that achieves an optimum tradeoff between usability and security. Indeed, passwords belonging to ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
to a highly structured language are essentially equivalent to low entropy strings. A fundamental goal is that of obtaining secure and efficient protocols, with optimum computational complexity, round complexity and communication efficiency. These properties make them ideal candidates for mobile devices
Strings as solitons and black holes as strings
"... Supersymmetric closed string theories contain an infinite tower of BPSsaturated, oscillating, macroscopic strings in the perturbative spectrum. When these theories have dual formulations, this tower of states must exist nonperturbatively as solitons in the dual theories. We present a general class ..."
Abstract

Cited by 17 (0 self)
 Add to MetaCart
of exact solutions of lowenergy supergravity that corresponds to all these states. After dimensional reduction they can be interpreted as supersymmetric black holes with a degeneracy related to the degeneracy of the string states. For example, in four dimensions we obtain a pointlike solution which
Entropy Bounds and String Cosmology
, 1999
"... After discussing some old (and notsoold) entropy bounds both for isolated systems and in cosmology, I will argue in favour of a “Hubble entropy bound ” holding in the latter context. I will then apply this bound to recent developments in string cosmology, show that it is naturally saturated throug ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
question (see e.g. [1]) is simple: it is because the Universe started in a lowentropy state and has not yet reached its maximal attainable entropy. But then, which is this maximal possible value of entropy and why has it not already been reached after so many billion years of cosmic evolution
A String Model of
, 1997
"... The statistical mechanics of black holes arbitrarily far from extremality is modeled by a gas of weakly interacting strings. As an effective low energy description of black holes the string model provides several highly nontrivial consistency checks and predictions. Speculations on a fundamental or ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
The statistical mechanics of black holes arbitrarily far from extremality is modeled by a gas of weakly interacting strings. As an effective low energy description of black holes the string model provides several highly nontrivial consistency checks and predictions. Speculations on a fundamental
Black Holes In String Theory
"... . The black hole solutions to Einstein's vacuum field equations are also solutions to the equations of motion of the low energy limit of superstring theory. At the same time, string theory boasts a much broader and richer collection of black hole solutions. Fortunately, string theories also pos ..."
Abstract
 Add to MetaCart
. The black hole solutions to Einstein's vacuum field equations are also solutions to the equations of motion of the low energy limit of superstring theory. At the same time, string theory boasts a much broader and richer collection of black hole solutions. Fortunately, string theories also
Some String Problems in Computational Biology
, 2004
"... This thesis introduces and analyzes a collection of string algorithms that are at the core of several biological problems. First, it presents the Grammar Transform Analysis and Compression (GTAC) entropy estimator, the rst entropy estimator for DNA sequences that has both proven properties and excel ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
This thesis introduces and analyzes a collection of string algorithms that are at the core of several biological problems. First, it presents the Grammar Transform Analysis and Compression (GTAC) entropy estimator, the rst entropy estimator for DNA sequences that has both proven properties
ThreeDimensional Black Holes and String Theory, hepth/9707188
"... It is observed that the threedimensional BTZ black hole is a supersymmetric solution of the lowenergy field equations of heterotic string theory compactified on an Einstein space. The solution involves a nonzero dilaton and NSNS Hfield. The entropy of the extreme black hole can then be computed ..."
Abstract

Cited by 36 (0 self)
 Add to MetaCart
It is observed that the threedimensional BTZ black hole is a supersymmetric solution of the lowenergy field equations of heterotic string theory compactified on an Einstein space. The solution involves a nonzero dilaton and NSNS Hfield. The entropy of the extreme black hole can
Results 1  10
of
115