Sciweavers

62 search results - page 4 / 13
» Harmonic Functions and Collision Probabilities
Sort
View
INFOCOM
2012
IEEE
11 years 8 months ago
Delay optimal multichannel opportunistic access
Abstract—The problem of minimizing queueing delay of opportunistic access of multiple continuous time Markov channels is considered. A new access policy based on myopic sensing a...
Shiyao Chen, Lang Tong, Qing Zhao
ICISC
2007
152views Cryptology» more  ICISC 2007»
13 years 7 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
13 years 11 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
IACR
2011
177views more  IACR 2011»
12 years 6 months ago
New attacks on Keccak-224 and Keccak-256
The Keccak hash function is one of the five finalists in NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: Afte...
Itai Dinur, Orr Dunkelman, Adi Shamir
INFOCOM
2003
IEEE
13 years 11 months ago
Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 network
Abstract— Throughput performance of the IEEE 802.11 Distributed Coordination Function (DCF) is very sensitive to the number n of competing stations. The contribute of this paper ...
Giuseppe Bianchi, Ilenia Tinnirello