Sciweavers

21 search results - page 3 / 5
» A Three Rounds Property of the AES
Sort
View
WISA
2009
Springer
14 years 1 days ago
Unknown Plaintext Template Attacks
In this paper we present a variation of the template attack classification process that can be applied to block ciphers when the plaintext and ciphertext used are unknown. In a na...
Neil Hanley, Michael Tunstall, William P. Marnane
PTS
2008
87views Hardware» more  PTS 2008»
13 years 6 months ago
Test Construction for Mathematical Functions
The article deals with problems of testing implementations of mathematical functions working with floating-point numbers. It considers current standards' requirements to such ...
Victor V. Kuliamin
ASIACRYPT
2001
Springer
13 years 10 months ago
Provable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the...
Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
INFOCOM
2000
IEEE
13 years 9 months ago
Comparisons of Packet Scheduling Algorithms for Fair Service Among Connections on the Internet
Abstract—We investigate the performance of TCP under three representatives of packet scheduling algorithms at the router. Our main focus is to investigate how fair service can be...
Go Hasegawa, Takahiro Matsuo, Masayuki Murata, Hid...
MOBIHOC
2009
ACM
14 years 6 months ago
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Wireless mesh networks (WMN) are finding increasing usage in city-wide deployments for providing network connectivity. Mesh routers in WMNs typically use multiple wireless channel...
Dong-Hoon Shin, Saurabh Bagchi