Sciweavers

101 search results - page 13 / 21
» Differential Cryptanalysis of Q
Sort
View
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
IVC
2006
82views more  IVC 2006»
13 years 7 months ago
Nonlinear optimisation method for image segmentation and noise reduction using geometrical intrinsic properties
This paper considers the optimisation of a nonlinear functional for image segmentation and noise reduction. Equations optimising this functional are derived and employed to detect...
Sasan Mahmoodi, Bayan S. Sharif
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 1 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
COMCOM
2004
111views more  COMCOM 2004»
13 years 7 months ago
An adaptive scheduling algorithm for differentiated services on WDM optical networks
One of the important issues in the design of future generation high-speed networks is to provide differentiated services to different types of applications with various time const...
Maode Ma, Mounir Hamdi
TCOM
2008
68views more  TCOM 2008»
13 years 7 months ago
MPSK modulated constellation design for differential space-time modulation
The constellation design for differential space-time modulation usually requires to construct L (constellation size) unitary matrices making the design complexity increasing rapidl...
Qinghua Shi, Q. T. Zhang