Sciweavers

11739 search results - page 101 / 2348
» Slideshow: functional presentations
Sort
View
ACISP
2008
Springer
14 years 4 months ago
Looking Back at a New Hash Function
Abstract. We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explor...
Olivier Billet, Matthew J. B. Robshaw, Yannick Seu...
ICICS
2007
Springer
14 years 4 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained ex...
Scott Contini, Krystian Matusiewicz, Josef Pieprzy...
WAIFI
2007
Springer
122views Mathematics» more  WAIFI 2007»
14 years 4 months ago
The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions
The first APN polynomials EA-inequivalent to power functions have been constructed in [7, 8] by applying CCZ-equivalence to the Gold APN functions. It is a natural question wheth...
Lilya Budaghyan
VTC
2006
IEEE
108views Communications» more  VTC 2006»
14 years 4 months ago
A New Pricing Function for Power Control Game in Wireless Data Networks
— This paper presents a new pricing function for noncooperative power control game in a single cell CDMA data network. Considering a utility function for each terminal, the purpo...
Abdorasoul Ghasemi, Karim Faez, Mehdi Dehghan
DATE
2003
IEEE
85views Hardware» more  DATE 2003»
14 years 3 months ago
Set Manipulation with Boolean Functional Vectors for Symbolic Reachability Analysis
Symbolic techniques usually use characteristic functions for representing sets of states. Boolean functional vectors provide an alternate set representation which is suitable for ...
Amit Goel, Randal E. Bryant