Sciweavers

1272 search results - page 39 / 255
» Blocking in All-Optical Networks
Sort
View
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
14 years 1 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
ANSS
2001
IEEE
14 years 4 days ago
Simulation-Based Engineering of Complex Adaptive Systems Using a Classifier Block
A Complex Adaptive System (CAS) is a network of communicating, intelligent agents where each agent adapts its behavior in order to collaborate with other agents to achieve overall...
John R. Clymer, David J. Chen
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
13 years 6 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
PET
2007
Springer
14 years 2 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 19 days ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui