Sciweavers

6404 search results - page 16 / 1281
» To Block or Not to Block
Sort
View
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
15 years 10 months ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
DATE
1999
IEEE
91views Hardware» more  DATE 1999»
15 years 9 months ago
Path Delay Fault Testing of ICs with Embedded Intellectual Property Blocks
In this paper we show that the already known method of using multiplexers for making the inputs and outputs of the embedded blocks accessible by the primary ports of the Integrate...
Dimitris Nikolos, Haridimos T. Vergos, Th. Haniota...
ARSCOM
2006
140views more  ARSCOM 2006»
15 years 5 months ago
Expansion Properties Of Levi Graphs
ABSTRACT. The Levi graph of a balanced incomplete block design is the bipartite graph whose vertices are the points and blocks of the design, with each block adjacent to those poin...
Dominic Lanphier, C. Miller, Jason Rosenhouse, A. ...
132
Voted
ENTCS
2002
92views more  ENTCS 2002»
15 years 5 months ago
PLCTools: Graph Transformation Meets PLC Design
This paper presents PLCTools, a formal environment for designing and simulating programmable controllers. Control models are specified with IEC FBD (Function Block Diagram), and t...
Luciano Baresi, Marco Mauri, Mauro Pezzè
EUROCRYPT
2001
Springer
15 years 9 months ago
Encryption Modes with Almost Free Message Integrity
We define a new mode of operation for block encryption which in addition to assuring confidentiality also assures message integrity. In contrast, previously for message integrity...
Charanjit S. Jutla