نتایج جستجو برای: 128

تعداد نتایج: 21232  

Journal: :IACR Cryptology ePrint Archive 2003
Phillip Rogaway David A. Wagner

CCM is a conventional authenticated-encryption scheme obtained from a 128-bit block cipher. The mechanism has been adopted as the mandatory encryption algorithm in an IEEE 802.11 draft stan­ dard [15], and its use has been proposed more broadly [16, 17]. In this note we point out a number of limitations of CCM. A related note provides an alternative to CCM [5].

Journal: :RFC 1996
Keith McCloghrie

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. The IP, UDP, and TCP MIB modules currentl...

2001
Liam Keliher Henk Meijer

In this paper, we demonstrate that the linear hull eeect is signiicant for the Q cipher. The designer of Q performs preliminary linear cryptanalysis by discussing linear characteristics involving only a single active bit at each stage 13]. We present a simple algorithm which combines all such linear characteristics with identical rst and last masks into a linear hull. The expected linear probab...

2005
Alex Biryukov

A proposal for a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.

Journal: :CoRR 2017
Eric R. Verheul

We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice ...

Journal: :IACR Cryptology ePrint Archive 2017
Jung Hee Cheon Kyoohyung Han Duhyeong Kim

Bootstrapping in fully homomorphic encryption (FHE) over the integers is a homomorphic evaluation of the squashed decryption function suggested by van Dijk et al. The typical approach for the bootstrapping is representing the decryption function as a binary circuit with a fixed message space. All bootstrapping methods in FHEs over the integers use this approach; however, these methods require t...

2004
Stewart Green Martyn A. Ould

Piecemeal development and support for organisational processes may lead to problems: first, it is difficult to know which processes should be supported, and, second, it is unlikely that piecemeal processes will work well together. The solution seems to lie in first developing a coherent process architecture. However, this raises a further problem: a number of different types of process architec...

Journal: :International Journal of Distributed Sensor Networks 2015

2010
Giorgos Passas Manolis Katevenis Dionisios N. Pnevmatikatos

We describe the implementation of a 128×128 crossbar switch in 90nm CMOS standard-cell ASIC technology. The crossbar operates at 750MHz and is 32-bits wide to provide a port capacity above 20Gb/s, while fitting in a silicon area as small as 6.6mm by filling it at the 90% level (control not included). Next, we arrange 128 1mm “user tiles” around the crossbar, forming a 150mm die, and we connect ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید