Sciweavers

650 search results - page 38 / 130
» Distorting symmetric designs
Sort
View
ASIACRYPT
2000
Springer
14 years 1 months ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
SIAMSC
2010
198views more  SIAMSC 2010»
13 years 7 months ago
Analysis of Block Parareal Preconditioners for Parabolic Optimal Control Problems
In this paper, we describe block matrix algorithms for the iterative solution of large scale linear-quadratic optimal control problems arising from the optimal control of parabolic...
Tarek P. Mathew, Marcus Sarkis, Christian E. Schae...
ISCAS
2007
IEEE
92views Hardware» more  ISCAS 2007»
14 years 3 months ago
Companding Baseband Switched Capacitor Filters and ADCs for WLAN Applications
— In this paper, system level design techniques for companding baseband switched capacitor (SC) filters for WLAN applications are presented. With companding, no AGC is required ...
Vaibhav Maheshwari, Wouter A. Serdijn, John R. Lon...
SIGCOMM
2010
ACM
13 years 9 months ago
PixNet: LCD-camera pairs as communication links
Given the abundance of cameras and LCDs in today's environment, there exists an untapped opportunity for using these devices for communication. Specifically, cameras can tune...
Samuel David Perli, Nabeel Ahmed, Dina Katabi
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
14 years 9 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima