Sciweavers

235 search results - page 5 / 47
» A Practical Mix
Sort
View
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
13 years 1 months ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
SP
2006
IEEE
14 years 3 months ago
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
Philippe Golle, XiaoFeng Wang, Markus Jakobsson, A...
TISSEC
2010
72views more  TISSEC 2010»
13 years 8 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
MOBIHOC
2008
ACM
14 years 9 months ago
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks
We present BEND, a MAC layer solution to practical network coding in multi-hop wireless networks. It is the first exploration of the broadcasting nature of wireless channels to pr...
Jian Zhang

Book
559views
15 years 7 months ago
Mixed Signal and DSP Design Techniques
"Mixed-Signal and DSP Design Techniques, edited by Walt Kester (Newnes, 2003) covers sampled data systems, choosing A-to-D and D-to-A converters for DSP applications, fast Fou...
Walt Kester