Sciweavers

213 search results - page 2 / 43
» New Message Difference for MD4
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
13 years 8 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
JPDC
2006
94views more  JPDC 2006»
13 years 5 months ago
Exchanging messages of different sizes
This paper deals with the study of the exchange of messages among a set of processors linked through an interconnection network. We focus on general, non-uniform versions of messa...
Alfredo Goldman, Joseph G. Peters, Denis Trystram
ACL
2012
11 years 7 months ago
Demonstration of IlluMe: Creating Ambient According to Instant Message Logs
We present IlluMe, a software tool pack which creates a personalized ambient using the music and lighting. IlluMe includes an emotion analysis software, the small space ambient li...
Lun-Wei Ku, Cheng-Wei Sun, Ya-Hsin Hsueh
MASS
2010
118views Communications» more  MASS 2010»
13 years 2 months ago
Implementation and evaluation of distance-based message authentication
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
Antony Chung, Utz Roedig
ICNP
1999
IEEE
13 years 9 months ago
Concast: Design and Implementation of a New Network Service
This paper introduces concast, a new network service. Concast is the inverse of multicast: multiple sources send messages toward the same destination, which results in a single me...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...