Sciweavers

694 search results - page 3 / 139
» The Power of the Middle Bit
Sort
View
IACR
2011
139views more  IACR 2011»
12 years 7 months ago
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
We revisit meet-in-the-middle attacks on block ciphers and recent developments in meet-in-the-middle preimage attacks on hash functions. Despite the presence of a secret key in the...
Lei Wei, Christian Rechberger, Jian Guo 0001, Hong...
ASPDAC
1995
ACM
104views Hardware» more  ASPDAC 1995»
13 years 11 months ago
Power analysis of a 32-bit embedded microcontroller
A new approach for power analysis of microprocessorshas recently been proposed [1]. The idea is to look at the power consumption in a microprocessor from the point of view of the ...
Vivek Tiwari, Mike Tien-Chien Lee
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 2 months ago
Computationally Efficient Optimal Discrete Bit Allocation for Medium and High Target Bit Rate DMT Transmissions
—A computationally efficient optimal discrete bit allocation algorithm is proposed for medium and high target bit rate discrete multitone (DMT) transmissions. Unlike conventional...
Li-ping Zhu, Xiaofeng Zhong, Yan Yao, Shi-wei Dong...
GLOBECOM
2007
IEEE
14 years 2 months ago
Optimum Power Allocation and Bit Loading for Systems with Suboptimum Receivers
— Waterfilling and mercury/waterfilling power allocation policies maximize the mutual information of independent parallel Gaussian-noise channels under an average power constra...
David Matas, Meritxell Lamarca
CORR
2008
Springer
164views Education» more  CORR 2008»
13 years 8 months ago
Joint Physical Layer Coding and Network Coding for Bi-Directional Relaying
Abstract-- We consider the problem of two transmitters wishing to exchange information through a relay in the middle. The channels between the transmitters and the relay are assume...
Makesh Pravin Wilson, Krishna R. Narayanan, Henry ...