Sciweavers

826 search results - page 14 / 166
» Designing for families
Sort
View
CORR
2006
Springer
105views Education» more  CORR 2006»
14 years 9 months ago
A Combinatorial Family of Near Regular LDPC Codes
Abstract-- An elementary combinatorial Tanner graph construction for a family of near-regular low density parity check (LDPC) codes achieving high girth is presented. These codes a...
K. Murali Krishnan, Rajdeep Singh, L. Sunil Chandr...
CISC
2009
Springer
181views Cryptology» more  CISC 2009»
14 years 7 months ago
Cryptanalysis of the ESSENCE Family of Hash Functions
Abstract. ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on ESSENCE....
Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson...
68
Voted
CHI
2009
ACM
15 years 10 months ago
Familial collaborations in a museum
Studies of interactive systems in museums have raised important design considerations, but so far have failed to address sufficiently the particularities of family interaction and...
Tom Hope, Yoshiyuki Nakamura, Toru Takahashi, Atsu...
83
Voted
DATE
2007
IEEE
146views Hardware» more  DATE 2007»
15 years 4 months ago
DFM/DFY: should you trust the surgeon or the family doctor?
Everybody agrees that curing DFM/DFY issues is of paramount importance at 65 nanometers and beyond. Unfortunately, there is disagreement about how and when to cure them. “Surgeo...
Marco Casale-Rossi, Andrzej J. Strojwas, Robert C....
INDOCRYPT
2007
Springer
15 years 3 months ago
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py...
Gautham Sekar, Souradyuti Paul, Bart Preneel