Sciweavers

628 search results - page 5 / 126
» On the Twofish Key Schedule
Sort
View
ASPDAC
2011
ACM
227views Hardware» more  ASPDAC 2011»
13 years 1 months ago
Minimizing buffer requirements for throughput constrained parallel execution of synchronous dataflow graph
– This paper concerns throughput-constrained parallel execution of synchronous data flow graphs. This paper assumes static mapping and dynamic scheduling of nodes, which has seve...
Tae-ho Shin, Hyunok Oh, Soonhoi Ha
TPDS
2010
115views more  TPDS 2010»
13 years 8 months ago
Providing QoS with the Deficit Table Scheduler
—A key component for networks with Quality of Service (QoS) support is the egress link scheduling algorithm. An ideal scheduling algorithm implemented in a high-performance netwo...
Raul Martinez-Morais, Francisco J. Alfaro-Cortes, ...
AAECC
2007
Springer
105views Algorithms» more  AAECC 2007»
14 years 3 months ago
On Non-randomness of the Permutation After RC4 Key Scheduling
Abstract. Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) by...
Goutam Paul, Subhamoy Maitra, Rohit Srivastava
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
14 years 3 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
SACRYPT
1999
Springer
14 years 1 months ago
Key-Schedule Cryptanalysis of DEAL
DEAL is a six- or eight-round Luby-Rackoff cipher that uses DES as its round function, with allowed key lengths of 128, 192, and 256 bits. In this paper, we discuss two new result...
John Kelsey, Bruce Schneier