Sciweavers

438 search results - page 15 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
CISS
2007
IEEE
13 years 11 months ago
How Many Users should be Turned On in a Multi-Antenna Broadcast Channel
This paper considers broadcast channels with L antennas at the base station and m single-antenna users, where each user has perfect channel knowledge and the base station obtains c...
Wei Dai, Youjian Liu, Brian Rider
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 2 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
ISQED
2007
IEEE
114views Hardware» more  ISQED 2007»
14 years 1 months ago
Intelligent Random Vector Generator Based on Probability Analysis of Circuit Structure
Design verification has become a bottleneck of modern designs. Recently, simulation-based random verification has attracted a lot of interests due to its effectiveness in uncoveri...
Yu-Min Kuo, Cheng-Hung Lin, Chun-Yao Wang, Shih-Ch...
VTC
2007
IEEE
135views Communications» more  VTC 2007»
14 years 1 months ago
MBER Turbo Multiuser Beamforming Aided QPSK Receiver Design Using EXIT Chart Analysis
Abstract— This paper studies the mutual information transfer characteristics of a novel iterative soft interference cancellation (SIC) aided beamforming receiver designed for qua...
Shuang Tan, Sheng Chen, Lajos Hanzo
IJON
2006
95views more  IJON 2006»
13 years 7 months ago
Generalized relevance LVQ (GRLVQ) with correlation measures for gene expression analysis
A correlation-based similarity measure is derived for generalized relevance learning vector quantization (GRLVQ). The resulting GRLVQ-C classifier makes Pearson correlation availa...
Marc Strickert, Udo Seiffert, Nese Sreenivasulu, W...