Sciweavers

694 search results - page 28 / 139
» The Power of the Middle Bit
Sort
View
FSE
1994
Springer
134views Cryptology» more  FSE 1994»
14 years 17 hour ago
Cryptanalysis of McGuffin
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES. 1 McGuffin Schneier and...
Vincent Rijmen, Bart Preneel
GLOBECOM
2010
IEEE
13 years 6 months ago
Analog Equalization for Low Power 60 GHz Receivers in Realistic Multipath Channels
Multi-gigabit per second wireless network devices are emerging for personal area networks (PAN) in the 60 GHz band. Such devices are typically power hungry, largely due to the requ...
Khursheed Hassan, Theodore S. Rappaport, Jeffrey G...
CC
2010
Springer
117views System Software» more  CC 2010»
13 years 5 months ago
Efficiently Certifying Non-Integer Powers
We describe a randomized algorithm that, given an integer a, produces a certificate that the integer is not a pure power of an integer in expected (log a)1+o(1) bit operations unde...
Erich Kaltofen, Mark Lavin
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 1 months ago
Top-Down Design of a Low-Power Multi-Channel 2.5-Gbit/s/Channel Gated Oscillator Clock-Recovery Circuit
We present a complete top-down design of a low-power multi-channel clock recovery circuit based on gated current-controlled oscillators. The flow includes several tools and method...
Paul Muller, Armin Tajalli, Seyed Mojtaba Atarodi,...
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
13 years 11 months ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...