Sciweavers

62 search results - page 8 / 13
» Harmonic Functions and Collision Probabilities
Sort
View
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 26 days ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
13 years 7 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
INFOCOM
2009
IEEE
14 years 1 months ago
Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception
—This paper considers a slotted ALOHA random access system where users send packets to a common receiver with multipacket reception capability. A collection of m users access the...
Paolo Minero, Massimo Franceschetti
INFOCOM
2002
IEEE
13 years 11 months ago
Nonlinear Instabilities in TCP-RED
Abstract—This work develops a discrete-time dynamical feedback system model for a simplified TCP network with RED control and provides a nonlinear analysis that can help in unde...
Eyad H. Abed, Priya Ranjan
WWIC
2005
Springer
137views Communications» more  WWIC 2005»
14 years 5 days ago
ECN Marking for Congestion Control in Multihop Wireless Networks
Abstract. In this paper we propose an approach to increase TCP’s fairness in multihop wireless networks, using ECN as a congestion signalling mechanism. The novel idea we introdu...
Vasilios A. Siris, Despina Triantafyllidou