Sciweavers

213 search results - page 2 / 43
» New Message Difference for MD4
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 3 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
JPDC
2006
94views more  JPDC 2006»
14 years 11 months ago
Exchanging messages of different sizes
This paper deals with the study of the exchange of messages among a set of processors linked through an interconnection network. We focus on general, non-uniform versions of messa...
Alfredo Goldman, Joseph G. Peters, Denis Trystram
ACL
2012
13 years 2 months ago
Demonstration of IlluMe: Creating Ambient According to Instant Message Logs
We present IlluMe, a software tool pack which creates a personalized ambient using the music and lighting. IlluMe includes an emotion analysis software, the small space ambient li...
Lun-Wei Ku, Cheng-Wei Sun, Ya-Hsin Hsueh
MASS
2010
118views Communications» more  MASS 2010»
14 years 9 months ago
Implementation and evaluation of distance-based message authentication
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
Antony Chung, Utz Roedig
ICNP
1999
IEEE
15 years 4 months ago
Concast: Design and Implementation of a New Network Service
This paper introduces concast, a new network service. Concast is the inverse of multicast: multiple sources send messages toward the same destination, which results in a single me...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...