Sciweavers

868 search results - page 7 / 174
» The EAX Mode of Operation
Sort
View
EUROCRYPT
2009
Springer
14 years 7 months ago
A Leakage-Resilient Mode of Operation
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to ? but weaker than ? a pseudorandom function: for wPRFs one only requires that the output is pseudorandom...
Krzysztof Pietrzak
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
13 years 10 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
ERSA
2006
89views Hardware» more  ERSA 2006»
13 years 8 months ago
Multi-Mode Operator for SHA-2 Hash Functions
We propose an improved implementation of the SHA-2 hash family to include a multi-mode of operation with minimal latency and hardware requirements over the entire operator. The mul...
Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arn...
ISCAS
2007
IEEE
104views Hardware» more  ISCAS 2007»
14 years 1 months ago
A 0.5V Bulk-Input Operational Transconductance Amplifier with Improved Common-Mode Feedback
Abstract—This paper presents the design of a two-stage pseudodifferential operational transconductance amplifier (OTA). The circuit was designed in a standard 0.18 µm, 0.5 V VT ...
Michael Trakimas, Sameer R. Sonkusale
SIGCOMM
1994
ACM
13 years 10 months ago
Signaling and Operating System Support for Native-Mode ATM Applications
Applications communicating over connectionless networks, such as IP, cannot obtain per-connection Quality of Service (QoS) guarantees. In contrast, the connection-oriented nature ...
Rosen Sharma, Srinivasan Keshav