Refine
Year of publication
- 2012 (42) (remove)
Document Type
- Conference Proceeding (25)
- Article (reviewed) (5)
- Article (unreviewed) (4)
- Patent (3)
- Part of a Book (2)
- Book (1)
- Contribution to a Periodical (1)
- Report (1)
Conference Type
- Konferenzartikel (17)
- Konferenz-Abstract (7)
- Sonstiges (1)
Has Fulltext
- no (42) (remove)
Is part of the Bibliography
- yes (42)
Keywords
- RoboCup (2)
- Signaltechnik (2)
- Aircraft (1)
- Arzneimittelprüfung (1)
- Attenuation (1)
- BLE (1)
- Batterie (1)
- Bildgebung (1)
- Brennstoffzelle (1)
- Collaborative learning (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (42) (remove)
Open Access
- Open Access (20)
- Closed (10)
- Closed Access (7)
- Bronze (5)
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
(2012)
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n-bit-iterated hash function framework based on an n-bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IVs and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n-bit-iterated hash function based on an n-bit compression function and with an n-bit chaining value that is proven indifferentiable from a RO.
In this paper, a complete passive transponder device has been discussed which is meant to monitor leakage in silicone breast implants. The passive tag operates in the HF frequency range of 13.56MHz using RFID ISO 15693 standard. The complete system consists of the transponder, reader and a PC. This paper focusses on the development of such a state of the art passive RFID transponder to monitor the wellness of the silicone breast implants periodically in order to detect leakage in the same. Keyword: RFID (Radio frequency identification device), EM (Electromagnetic) field, Passive Transponder, Silicone breast implants.
The Humboldt digital library (HDL) represents an innovative system to access the works and legacy of Alexander von Humboldt in a digital form on the Internet (www.avhumboldt.net). It contributes to the key question about how to present interconnected data in an appropriate form using information technologies. The HDL has been created as a dynamic digital library with the capability of connecting multilingual and multimedia data from diverse online archives. Humboldt’s volumes have become available, but beyond that any relevant information related to the observations of Humboldt, even outside the works can become immediately accessible. This makes it possible to recognize natural changes and compare Humboldt’s descriptions with recent situations. The technology we have developed addresses the issues of sustainability and makes it possible to detect changes in the environment since the time of Humboldt’s observations.
This paper describes the magmaOffenburg 3D simulation team trying to qualify for RoboCup 2012. While last year’s TDP focused on the tool set created for 3D simulation and the support for heterogeneous robot models, this year we focus on the different ways how robot behavior can be defined in the magmaOffenburg framework and how those behaviors can be improved by learning.
This paper analyzes the applicability of existing communication technology on the Smart Grid. In particular it evaluates how networks, e.g. Peer-to-Peer (P2P) and decentralized Virtual Private Network (VPN) can help set up an agent-based system. It is expected that applications on Smart Grid devices will become more powerful and be able to operate without a central control instance. We analyze which requirements agents and Smart Grid devices place on communication systems and validate promising approaches. The main focus is to create a logical overlay network that provides direct communication between network nodes. We provide a comparison of different approaches of P2P networks and mesh-VPNs. Finally the advantages of mesh-VPN for agent-based systems are worked out.
In sicherheitskritschen Systemen darf kein Stück Code im Produktionsbetrieb ablaufen, ohne vorher intensive Tests durchlaufen zu haben. Aber auch zur Qualitätssicherung muss Software getestet werden. Um die Codeüberdeckung zu prüfen, sind zusätzliche Prüf-Instruktionen im Quellcode erforderlich. Auf kleinen Systemen mit wenig RAM kann sich der Entwickler dann etwas einfallen lassen, damit das funktioniert.