Sciweavers

31 search results - page 5 / 7
» pads 2009
Sort
View
DCC
2009
IEEE
14 years 4 months ago
On Compression of Data Encrypted with Block Ciphers
This paper investigates compression of encrypted data. It has been previously shown that data encrypted with Vernam’s scheme [1], also known as the one-time pad, can be compress...
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo...
PADS
2009
ACM
14 years 4 months ago
Scalable Time Warp on Blue Gene Supercomputers
Abstract—In this paper we illustrate scalable parallel performance for the Time Warp synchronization protocol on the L and P variants of the IBM Blue Gene supercomputer. Scalable...
David W. Bauer, Christopher D. Carothers, Akintayo...
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
14 years 4 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
14 years 1 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 2 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi