Sciweavers

1019 search results - page 68 / 204
» Uniform Functors on Sets
Sort
View
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
13 years 8 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
GLOBECOM
2008
IEEE
13 years 7 months ago
Alternating Cooperative Transmission for Energy-Efficient Broadcasting
We propose a broadcast protocol that is based on a form of cooperative diversity called the Opportunistic Large Array (OLA). In the initial broadcast, an SNR ("transmission&qu...
Aravind Kailas, Mary Ann Ingram
CDC
2010
IEEE
108views Control Systems» more  CDC 2010»
13 years 2 months ago
Optimal pursuit of moving targets using dynamic Voronoi diagrams
We consider Voronoi-like partitions for a team of moving targets distributed in the plane, such that each set in this partition is uniquely associated with a particular moving targ...
Efstathios Bakolas, Panagiotis Tsiotras
MTA
2011
203views Hardware» more  MTA 2011»
13 years 2 months ago
Interoperable digital rights management based on the MPEG Extensible Middleware
Abstract This paper describes an interoperable Digital Rights Management architecture promoted by the MPEG standardization group in its new standard known as MPEG-M or MPEG Extensi...
Víctor Rodríguez-Doncel, Jaime Delga...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs