— We provide achievability as well as converse results for the degrees of freedom region of a MIMO X channel, i.e., a system with two transmitters, two receivers, each equipped w...
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Background: DNA microarrays are used to investigate differences in gene expression between two or more classes of samples. Most currently used approaches compare mean expression l...
Abstract. This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Ou...
Gregory V. Bard, Nicolas Courtois, Jorge Nakahara,...