نتایج جستجو برای: 128
تعداد نتایج: 21232 فیلتر نتایج به سال:
CCM is a conventional authenticated-encryption scheme obtained from a 128-bit block cipher. The mechanism has been adopted as the mandatory encryption algorithm in an IEEE 802.11 draft stan dard [15], and its use has been proposed more broadly [16, 17]. In this note we point out a number of limitations of CCM. A related note provides an alternative to CCM [5].
Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. The IP, UDP, and TCP MIB modules currentl...
In this paper, we demonstrate that the linear hull eeect is signiicant for the Q cipher. The designer of Q performs preliminary linear cryptanalysis by discussing linear characteristics involving only a single active bit at each stage 13]. We present a simple algorithm which combines all such linear characteristics with identical rst and last masks into a linear hull. The expected linear probab...
A proposal for a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.
We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice ...
Bootstrapping in fully homomorphic encryption (FHE) over the integers is a homomorphic evaluation of the squashed decryption function suggested by van Dijk et al. The typical approach for the bootstrapping is representing the decryption function as a binary circuit with a fixed message space. All bootstrapping methods in FHEs over the integers use this approach; however, these methods require t...
Piecemeal development and support for organisational processes may lead to problems: first, it is difficult to know which processes should be supported, and, second, it is unlikely that piecemeal processes will work well together. The solution seems to lie in first developing a coherent process architecture. However, this raises a further problem: a number of different types of process architec...
We describe the implementation of a 128×128 crossbar switch in 90nm CMOS standard-cell ASIC technology. The crossbar operates at 750MHz and is 32-bits wide to provide a port capacity above 20Gb/s, while fitting in a silicon area as small as 6.6mm by filling it at the 90% level (control not included). Next, we arrange 128 1mm “user tiles” around the crossbar, forming a 150mm die, and we connect ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید