Sciweavers

1834 search results - page 233 / 367
» Public Key Cryptography
Sort
View
113
Voted
SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
15 years 9 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
107
Voted
C3S2E
2009
ACM
15 years 9 months ago
Radius selection algorithms for sphere decoding
The integer least squares problem arises from many applications such as communications, cryptography, and GPS. In this paper, we consider the sphere decoding method in communicati...
Fei Zhao, Sanzheng Qiao
94
Voted
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 9 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
WETICE
2008
IEEE
15 years 9 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
105
Voted
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
15 years 8 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...