Sciweavers

517 search results - page 73 / 104
» Bit Encryption Is Complete
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Resource management for fading wireless channels with energy harvesting nodes
—Wireless systems comprised of rechargeable nodes have a significantly prolonged lifetime and are sustainable. A distinct characteristic of these systems is the fact that the no...
Omur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulu...
PLDI
2005
ACM
14 years 1 months ago
Programming by sketching for bit-streaming programs
This paper introduces the concept of programming with sketches, an approach for the rapid development of high-performance applications. This approach allows a programmer to write ...
Armando Solar-Lezama, Rodric M. Rabbah, Rastislav ...
ICS
2010
Tsinghua U.
14 years 5 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
NOMS
2000
IEEE
118views Communications» more  NOMS 2000»
14 years 9 days ago
On the enhancement of a differentiated services scheme
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...
Runtong Zhang, Jian Ma