Sciweavers

891 search results - page 129 / 179
» Full Abstraction for PCF
Sort
View
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
14 years 10 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
FPL
2010
Springer
129views Hardware» more  FPL 2010»
14 years 10 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
GLOBECOM
2010
IEEE
14 years 10 months ago
Space-Time Network Codes Utilizing Transform-Based Coding
Abstract-- Cooperative communications can be used to improve communication reliability. However, the transmissions from different relaying nodes result in a great challenge in prac...
Hung-Quoc Lai, Zhenzhen Gao, K. J. Ray Liu
GLOBECOM
2010
IEEE
14 years 10 months ago
Differential Cooperative Communications with Space-Time Network Coding
Abstract--In multinode cooperative communications, simultaneous transmissions from two or more nodes are challenging due to its asynchronous nature. In addition, channel estimation...
Zhenzhen Gao, Hung-Quoc Lai, K. J. Ray Liu
IPPS
2010
IEEE
14 years 9 months ago
Use of Peer-To-Peer technology in Internet access networks and its impacts
Abstract--Objectives of the dissertation are impacts of Peerto-Peer (P2P) traffic on Internet core networks as well as novel approaches for using P2P technology in Internet access ...
Peter Danielis, Dirk Timmermann