Sciweavers

1236 search results - page 8 / 248
» Prefix-Like Complexities and Computability in the Limit
Sort
View
ASIACRYPT
1991
Springer
13 years 11 months ago
Limitations of the Even-Mansour Construction
In [1] a construction of a block cipher from a single pseudorandom permutation is proposed. In a complexity theoretical setting they prove that this scheme is secure against a pol...
Joan Daemen
ICDCSW
2005
IEEE
14 years 1 months ago
IASO - An Activity-Based Computing Platform for Wearable Computing
Displaying and navigating complex information on wearable computers is very different from accessing the same information while sitting at your desk. Limitations in hardware, scre...
Jakob E. Bardram, Jonathan Bunde-Pedersen
LCTRTS
2010
Springer
14 years 2 months ago
Elastic computing: a framework for transparent, portable, and adaptive multi-core heterogeneous computing
Over the past decade, system architectures have started on a clear trend towards increased parallelism and heterogeneity, often resulting in speedups of 10x to 100x. Despite numer...
John Robert Wernsing, Greg Stitt
WEWORC
2007
129views Cryptology» more  WEWORC 2007»
13 years 8 months ago
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
This paper presents two key-recovery attacks against the last modication to Achterbahn-128/80 proposed by the authors at SASC 2007 due to the previous attacks. The 80-bit variant,...
María Naya-Plasencia
ICCAD
2005
IEEE
79views Hardware» more  ICCAD 2005»
14 years 4 months ago
The impact of the nanoscale on computing systems
— Nanoscale technologies provide both challenges and opportunities. We show that the issues and potential solutions facing designers are technology independent and arise mainly f...
Seth Copen Goldstein