Sciweavers

DAGSTUHL
2007
13 years 7 months ago
07021 Abstracts Collection -- Symmetric Cryptography
Eli Biham, Helena Handschuh, Stefan Lucks, Vincent...
DAGSTUHL
2007
13 years 7 months ago
Tightness of the Security Bound of CENC
CENC (Cipher-based ENCryption) is the recently designed encryption mode for blockciphers. It is provably secure with beyond the birthday bound. In this note, we present a simple di...
Tetsu Iwata
DAGSTUHL
2007
13 years 7 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
DAGSTUHL
2007
13 years 7 months ago
Design and Primitive Specification for Shannon
Gregory G. Rose, Philip Hawkes, Michael Paddon, Ca...
DAGSTUHL
2007
13 years 7 months ago
Block and Stream Ciphers and the Creatures in Between
In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher wh...
Alex Biryukov
DAGSTUHL
2007
13 years 7 months ago
Energy Scalability and the RESUME Scalable Video Codec
In the context of the RESUME-project a scalable wavelet-based video decoder was built to demonstrate the benefits of reconfigurable hardware for scalable applications. Scalable v...
Harald Devos, Hendrik Eeckhaut, Mark Christiaens, ...
DAGSTUHL
2007
13 years 7 months ago
Lifetime Extension of Higher Class UHF RFID Tags using special Power Management Techniques and Energy Harvesting Devices
Abstract. Enhanced RFID tag technology especially in the UHF frequency range provides extended functionality like high operating range and sensing and monitoring capabilities. Such...
Alex Janek, Christian Steger, Josef Preishuber-Pfl...