Sciweavers

5722 search results - page 82 / 1145
» Security Function Interactions
Sort
View
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
14 years 2 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
IROS
2006
IEEE
193views Robotics» more  IROS 2006»
14 years 2 months ago
Adaptive Human-Robot Interaction System using Interactive EC
— We created a human-robot communication system that can adapt to user preferences that can easily change through communication. Even if any learning algorithms are used, evaluat...
Yuki Suga, Chihiro Endo, Daizo Kobayashi, T. Matsu...
FSE
1997
Springer
119views Cryptology» more  FSE 1997»
14 years 29 days ago
Cryptanalysis of Ladder-DES
Feistel ciphers are very common and very important in the design and analysis of blockciphers, especially due to four reasons: (1) Many (DES-like) ciphers are based on Feistel’s ...
Eli Biham
PERCOM
2005
ACM
14 years 8 months ago
Gaia Microserver: An Extendable Mobile Middleware Platform
The Gaia ubiquitous computing platform currently supports mobile devices through a thin client proxy architecture. Mobile devices run a lightweight proxy client written in J2ME to...
Ellick Chan, Jim Bresler, Jalal Al-Muhtadi, Roy H....
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 2 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner