Sciweavers

20175 search results - page 139 / 4035
» Is abstraction the key to computing
Sort
View
93
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
123
Voted
TCOM
2010
195views more  TCOM 2010»
14 years 7 months ago
Coherent and Differential Space-Time Shift Keying: A Dispersion Matrix Approach
Abstract--Motivated by the recent concept of Spatial Modulation (SM), we propose a novel Space-Time Shift Keying (STSK) modulation scheme for Multiple-Input Multiple-Output (MIMO) ...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
92
Voted
DATE
2009
IEEE
111views Hardware» more  DATE 2009»
15 years 7 months ago
Increased accuracy through noise injection in abstract RTOS simulation
RTOS Simulation Henning Zabel, Wolfgang Mueller Universität Paderborn, C-LAB Fürstenallee 11, D-33102 Paderborn, Germany —Today, mobile and embedded real-time systems have to c...
Henning Zabel, Wolfgang Mueller
92
Voted
AIMS
2007
Springer
15 years 2 months ago
Iterative Key Based Routing for Web Services Addressing and Discovery
As the nodes and the resources in a structured peer-to-peer network are indexed with unique identifiers, and as the identifiers are assigned to nodes whose nodeId (i.e., the iden...
Marco Milanesio, Giancarlo Ruffo
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 4 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...