Sciweavers

1262 search results - page 69 / 253
» Fast Robust Hashing
Sort
View
87
Voted
ICCD
1993
IEEE
90views Hardware» more  ICCD 1993»
15 years 5 months ago
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip
In this paper the design of a high-speed cryptographic coprocessor is presented. This coprocessor is named Subterranean and can be used for both cryptographic pseudorandom sequenc...
Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Pee...
99
Voted
IJNSEC
2008
132views more  IJNSEC 2008»
15 years 24 days ago
Improved Security Mechanism for Mobile IPv6
Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. Th...
Jing Li, Po Zhang, Srinivas Sampalli
140
Voted
CODCRY
2011
Springer
242views Cryptology» more  CODCRY 2011»
14 years 4 months ago
Faster 2-Regular Information-Set Decoding
Fix positive integers B and w. Let C be a linear code over F2 of length Bw. The 2-regular-decoding problem is to find a nonzero codeword consisting of w length-B blocks, each of w...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
144
Voted
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 4 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
134
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
The Variable-Increment Counting Bloom Filter
—Counting Bloom Filters (CBFs) are widely used in networking device algorithms. They implement fast set representations to support membership queries with limited error, and supp...
Ori Rottenstreich, Yossi Kanizo, Isaac Keslassy