Sciweavers

3 search results - page 1 / 1
» The Doubling Attack - Why Upwards Is Better than Downwards
Sort
View
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 3 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
80
Voted
COMCOM
2004
112views more  COMCOM 2004»
14 years 10 months ago
Design and analysis of optimal adaptive de-jitter buffers
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design...
Gagan L. Choudhury, Robert G. Cole
BMCBI
2007
106views more  BMCBI 2007»
14 years 10 months ago
In silico identification of NF-kappaB-regulated genes in pancreatic beta-cells
Background: Pancreatic beta-cells are the target of an autoimmune attack in type 1 diabetes mellitus (T1DM). This is mediated in part by cytokines, such as interleukin (IL)-1β an...
Najib Naamane, Jacques van Helden, Decio L. Eiziri...