Sciweavers

872 search results - page 95 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
INDOCRYPT
2003
Springer
14 years 29 days ago
Stronger Security Bounds for OMAC, TMAC, and XCBC
OMAC, TMAC and XCBC are CBC-type MAC schemes which are provably secure for arbitrary message length. In this paper, we present a more tight upper bound on Advmac for each scheme, w...
Tetsu Iwata, Kaoru Kurosawa
DATE
2010
IEEE
110views Hardware» more  DATE 2010»
14 years 26 days ago
Enabling efficient post-silicon debug by clustering of hardware-assertions
—Bug-free first silicon is not guaranteed by the existing pre-silicon verification techniques. To have impeccable products, it is now required to identify any bug as soon as the ...
Mohammad Hossein Neishaburi, Zeljko Zilic
IWCMC
2009
ACM
14 years 13 days ago
Interference and throughput analyses in dual-polarized wireless networks subject to Rayleigh fading
This paper investigates the impact of the polarization on the achievable throughput and the probability of successful transmission in the cellular network architectures. A channel...
Jean-Michel Dricot, François Horlin, Philip...
IV
2000
IEEE
99views Visualization» more  IV 2000»
14 years 4 days ago
DILEWA: The DIstributed Learning Environment Without Avatars
Nowadays multi-user VR systems are mostly aimed to social interaction, whereas exploitation of shared virtual environment for educational purposes has been mainly left aside. We i...
Michal Masa, Jiri Zara
ECRTS
1999
IEEE
14 years 2 days ago
Timed automaton models for simple programmable logic controllers
We give timed automaton models for a class of Programmable Logic Controller (PLC) applications, that are programmed in a simple fragment of the language Instruction Lists as defin...
Angelika Mader, Hanno Wupper