Sciweavers

628 search results - page 3 / 126
» On the Twofish Key Schedule
Sort
View
ASWEC
2009
IEEE
14 years 9 months ago
From Requirements to Embedded Software - Formalising the Key Steps
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...
Toby Myers, R. Geoff Dromey
JPDC
2010
181views more  JPDC 2010»
14 years 10 months ago
T-L plane-based real-time scheduling for homogeneous multiprocessors
We consider optimal real-time scheduling of periodic tasks on multiprocessors—i.e., satisfying all task deadlines, when the total utilization demand does not exceed the ion capa...
Hyeonjoong Cho, Binoy Ravindran, E. Douglas Jensen
IACR
2011
85views more  IACR 2011»
13 years 11 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
ESORICS
2004
Springer
15 years 5 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
JIDM
2010
155views more  JIDM 2010»
14 years 10 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...