Sciweavers

517 search results - page 73 / 104
» Bit Encryption Is Complete
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Resource management for fading wireless channels with energy harvesting nodes
—Wireless systems comprised of rechargeable nodes have a significantly prolonged lifetime and are sustainable. A distinct characteristic of these systems is the fact that the no...
Omur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulu...
PLDI
2005
ACM
15 years 3 months ago
Programming by sketching for bit-streaming programs
This paper introduces the concept of programming with sketches, an approach for the rapid development of high-performance applications. This approach allows a programmer to write ...
Armando Solar-Lezama, Rodric M. Rabbah, Rastislav ...
ICS
2010
Tsinghua U.
15 years 7 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
NOMS
2000
IEEE
118views Communications» more  NOMS 2000»
15 years 2 months ago
On the enhancement of a differentiated services scheme
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...
Runtong Zhang, Jian Ma