Sciweavers

149 search results - page 6 / 30
» Nonce-Based Symmetric Encryption
Sort
View
JOT
2006
75views more  JOT 2006»
13 years 9 months ago
Encrypting the Java Serialized Object
The cryptographic classes incorporated into Sun's releases of the Java Virtual Machine are often used in e-commerce and other applications. A mechanism exists for signing a J...
Alan Ward
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
13 years 10 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
IPPS
1996
IEEE
14 years 2 months ago
A Memory Controller for Improved Performance of Streamed Computations on Symmetric Multiprocessors
The growing disparity between processor and memory speeds has caused memory bandwidth to become the performance bottleneck for many applications. In particular, this performance g...
Sally A. McKee, William A. Wulf
WOWMOM
2009
ACM
142views Multimedia» more  WOWMOM 2009»
14 years 4 months ago
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Gill R. Tsouri
ITIIS
2010
200views more  ITIIS 2010»
13 years 4 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee