Sciweavers

930 search results - page 183 / 186
» A Universal Encryption Standard
Sort
View
ASIACRYPT
2010
Springer
13 years 7 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
PIMRC
2010
IEEE
13 years 7 months ago
Cooperative interference-aware joint scheduling for the 3GPP LTE uplink
In current cellular networks base stations (BSs) usually perform independent scheduling without coordinating the resource allocation among different cells. This, however, often lea...
Philipp Frank, Andreas Müller 0001, Heinz Dro...
GI
2009
Springer
13 years 7 months ago
A BPMN Case Study: Paper Review and Submission System
: We explore the expressiveness of the BPMN workflow modelling language by applying it to MuCoMS, a paper submission system. This well known application domain is a suitable exampl...
Markus Kirchberg, Ove Sörensen, Bernhard Thal...
BMCBI
2011
13 years 4 months ago
Simulated evolution applied to study the genetic code optimality using a model of codon reassignments
Background: As the canonical code is not universal, different theories about its origin and organization have appeared. The optimization or level of adaptation of the canonical ge...
Jose Santos, Ángel Monteagudo
BSL
2011
13 years 4 months ago
Combinatorial dichotomies in set theory
show that an abstract analysis of one of these three set theoretic principles can sometimes lead us to results that do not require additional axioms at all but which could have bee...
Stevo Todorcevic