Sciweavers

34 search results - page 6 / 7
» Perfect Block Ciphers with Small Blocks
Sort
View
ICIP
2007
IEEE
14 years 1 days ago
Infinity-Norm Rotation for Reversible Data Hiding
In this paper, we propose a novel transform that preserves the dynamic range—infinity-norm rotation. This transform is perfectly reversible and piecewise linear, and keeps the m...
Lei Yang, Pengwei Hao
ASPDAC
2007
ACM
79views Hardware» more  ASPDAC 2007»
13 years 9 months ago
Challenges to Accuracy for the Design of Deep-Submicron RF-CMOS Circuits
- Two challenges for the accurate prediction of GHz CMOS analog/RF building blocks are presented. Challenging the usage of new compact MOSFET models enhances the simulation accurac...
S. Yoshitomi
EUROCRYPT
2009
Springer
14 years 6 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
TIT
2008
78views more  TIT 2008»
13 years 5 months ago
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
The nonlinearity profile of a Boolean function (i.e. the sequence of its minimum Hamming distances nlr(f) to all functions of degrees at most r, for r 1) is a cryptographic crite...
Claude Carlet
COCOON
2008
Springer
13 years 7 months ago
Haplotype Inferring Via Galled-Tree Networks Is NP-Complete
The problem of determining haplotypes from genotypes has gained considerable prominence in the research community since the beginning of the HapMap project. Here the focus is on de...
Arvind Gupta, Ján Manuch, Ladislav Stacho, ...