Sciweavers

118
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
The Security of Chaffing and Winnowing
This paper takes a closer look at Rivest's chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given ...
Mihir Bellare, Alexandra Boldyreva
149
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM2 = N2 for 1 T N. ...
Alex Biryukov, Adi Shamir
ASAP
2000
IEEE
163views Hardware» more  ASAP 2000»
15 years 7 months ago
Efficient VLSI Architectures for Baseband Signal Processing in Wireless Base-Station Receivers
Sridhar Rajagopal, Srikrishna Bhashyam, Joseph R. ...
142
Voted
ASAP
2000
IEEE
102views Hardware» more  ASAP 2000»
15 years 7 months ago
A Theory for Software-Hardware Co-Scheduling for ASIPs and Embedded Processors
Exploiting instruction-level parallelism (ILP) is extremely important for achieving high performance in application specific instruction set processors (ASIPs) and embedded proces...
Ramaswamy Govindarajan, Erik R. Altman, Guang R. G...