Sciweavers

406 search results - page 57 / 82
» Constraints on Strong Generative Power
Sort
View
AFRICACRYPT
2008
Springer
15 years 7 months ago
Correlated Keystreams in Moustique
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different...
Emilia Käsper, Vincent Rijmen, Tor E. Bj&osla...
103
Voted
PROVSEC
2007
Springer
15 years 6 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
CORR
2010
Springer
84views Education» more  CORR 2010»
15 years 25 days ago
Outage Probability for Multi-Cell Processing under Rayleigh Fading
Abstract--Multi-cell processing, also called Coordinated Multiple Point (CoMP), is a very promising distributed multi-antennas technique that uses neighbour cell's antennas. T...
Virgile Garcia, Jean-Marie Gorce, Nikolai Lebedev
160
Voted
ISPD
2012
ACM
288views Hardware» more  ISPD 2012»
13 years 8 months ago
Construction of realistic gate sizing benchmarks with known optimal solutions
Gate sizing in VLSI design is a widely-used method for power or area recovery subject to timing constraints. Several previous works have proposed gate sizing heuristics for power ...
Andrew B. Kahng, Seokhyeong Kang
109
Voted
CODES
2004
IEEE
15 years 4 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...