Sciweavers

868 search results - page 16 / 174
» The EAX Mode of Operation
Sort
View
EUROCRYPT
2001
Springer
13 years 11 months ago
Encryption Modes with Almost Free Message Integrity
We define a new mode of operation for block encryption which in addition to assuring confidentiality also assures message integrity. In contrast, previously for message integrity...
Charanjit S. Jutla
GLOBECOM
2009
IEEE
14 years 2 months ago
System-Level Performance Evaluation of Multi-Cell Transparent Mode Relay 802.16j Systems
— In this paper, the system capacity of a multi-cell IEEE 802.16j system operating in transparent mode is investigated. A previous published analytical model is used and incorpor...
Vasken Genc, Seán Murphy, John Murphy, Abde...
CRYPTO
2007
Springer
88views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Invertible Universal Hashing and the TET Encryption Mode
This work describes a mode of operation, TET, that turns a regular block cipher into a length-preserving enciphering scheme for messages of (almost) arbitrary length. When using a...
Shai Halevi
CISC
2005
Springer
129views Cryptology» more  CISC 2005»
14 years 26 days ago
HCTR: A Variable-Input-Length Enciphering Mode
This paper proposes a blockcipher mode of operation, HCTR, which is a length-preserving encryption mode. HCTR turns an n-bit blockcipher into a tweakable blockcipher that supports ...
Peng Wang, Dengguo Feng, Wenling Wu
WCE
2007
13 years 8 months ago
Genetic Algorithm Optimized PI and Fuzzy Sliding Mode Speed Control for DTC Drives
— This paper presents a detailed comparison between a conventional PI controller and a variable structure controller based on a fuzzy sliding mode strategy used for speed control...
Shady M. Gadoue, Damian Giaouris, J. W. Finch