Sciweavers

891 search results - page 129 / 179
» Full Abstraction for PCF
Sort
View
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
13 years 5 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 5 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
GLOBECOM
2010
IEEE
13 years 5 months ago
Space-Time Network Codes Utilizing Transform-Based Coding
Abstract-- Cooperative communications can be used to improve communication reliability. However, the transmissions from different relaying nodes result in a great challenge in prac...
Hung-Quoc Lai, Zhenzhen Gao, K. J. Ray Liu
GLOBECOM
2010
IEEE
13 years 5 months ago
Differential Cooperative Communications with Space-Time Network Coding
Abstract--In multinode cooperative communications, simultaneous transmissions from two or more nodes are challenging due to its asynchronous nature. In addition, channel estimation...
Zhenzhen Gao, Hung-Quoc Lai, K. J. Ray Liu
IPPS
2010
IEEE
13 years 5 months ago
Use of Peer-To-Peer technology in Internet access networks and its impacts
Abstract--Objectives of the dissertation are impacts of Peerto-Peer (P2P) traffic on Internet core networks as well as novel approaches for using P2P technology in Internet access ...
Peter Danielis, Dirk Timmermann