Sciweavers

506 search results - page 64 / 102
» The Block Cipher Square
Sort
View
TIT
2008
106views more  TIT 2008»
15 years 2 months ago
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators
This article describes new theoretical results concerning the general behavior of a Feedback with Carry Shift Register (FCSR) automaton. They help to better understand how the init...
François Arnault, Thierry P. Berger, Marine...
93
Voted
IJNSEC
2010
105views more  IJNSEC 2010»
14 years 9 months ago
A Note on the Constructions of Orthomorphic Permutations
Orthomorphic permutations have important applications in the design of block ciphers. A practical algorithm is derived to generate all orthomorphic permutations over Fm 2 , and it...
Jianqin Zhou
110
Voted
TISSEC
2010
115views more  TISSEC 2010»
14 years 9 months ago
A Simple and Generic Construction of Authenticated Encryption with Associated Data
We revisit the problem of constructing a protocol for performing authenticated encryption with associated data (AEAD). A technique is described which combines a collision resistant...
Palash Sarkar
121
Voted
TIT
2010
121views Education» more  TIT 2010»
14 years 9 months ago
Power of a public random permutation and its application to authenticated encryption
In this paper, we first show that many independent pseudorandom permutations over {0, 1}n can be obtained from a single public random permutation and secret n bits. We next prove ...
Kaoru Kurosawa
108
Voted
ICIP
2002
IEEE
15 years 7 months ago
Wavelet-domain reconstruction of lost blocks in wireless image transmission and packet-switched networks
— A fast scheme for wavelet-domain interpolation of lost image blocks in wireless image transmission is presented in this paper. The algorithm is designed to be compatible with t...
Shantanu Rane, Jeremiah Remus, Guillermo Sapiro