Sciweavers

62 search results - page 6 / 13
» Harmonic Functions and Collision Probabilities
Sort
View
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 1 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
DAC
2010
ACM
13 years 10 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
GLOBECOM
2009
IEEE
14 years 1 months ago
Collaborative Quickest Spectrum Sensing via Random Broadcast in Cognitive Radio Systems
Abstract— Quickest detection is applied in the spectrum sensing of cognitive radio systems when multiple secondary users collaborate with limited communication time slots. When t...
Husheng Li, Huaiyu Dai, Chengzhi Li
WCNC
2010
IEEE
13 years 10 months ago
Performance Bounds for AF Multi-Hop Relaying over Nakagami Fading
Abstract—This paper presents a new upper bound on the endto-end signal-to-noise ratio (SNR) of channel-assisted amplifyand-forward (AF) multi-hop relay networks. The harmonic mea...
Gayan Amarasuriya, Chintha Tellambura, Masoud Arda...
IACR
2011
122views more  IACR 2011»
12 years 6 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar