The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 competition, organised by NIST [4]. The proposal contains seven concrete has...
The control of dynamic systems that undergo an impact collision is both theoretically challenging and of practical importance. An appeal of studying systems that undergo an impact ...
Keith Dupree, Chien-Hao Liang, Guoqiang Hu, Warren...
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Abstract--It was shown recently that carrier sense multiple access (CSMA)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing n...
We present an interactive algorithm to perform continuous collision detection between general deformable models using graphics processors (GPUs). We model the motion of each objec...
Naga K. Govindaraju, Ilknur Kabul, Ming C. Lin, Di...