Sciweavers

62 search results - page 8 / 13
» Harmonic Functions and Collision Probabilities
Sort
View
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 3 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
14 years 10 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
INFOCOM
2009
IEEE
15 years 4 months ago
Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception
—This paper considers a slotted ALOHA random access system where users send packets to a common receiver with multipacket reception capability. A collection of m users access the...
Paolo Minero, Massimo Franceschetti
INFOCOM
2002
IEEE
15 years 2 months ago
Nonlinear Instabilities in TCP-RED
Abstract—This work develops a discrete-time dynamical feedback system model for a simplified TCP network with RED control and provides a nonlinear analysis that can help in unde...
Eyad H. Abed, Priya Ranjan
WWIC
2005
Springer
137views Communications» more  WWIC 2005»
15 years 3 months ago
ECN Marking for Congestion Control in Multihop Wireless Networks
Abstract. In this paper we propose an approach to increase TCP’s fairness in multihop wireless networks, using ECN as a congestion signalling mechanism. The novel idea we introdu...
Vasilios A. Siris, Despina Triantafyllidou