Learn More
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered(More)
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition , they generally aim to be implemented efficiently on a large variety of platforms. In this paper, we take an opposite approach and consider a context where we have very limited processing resources and throughput(More)
Preface This book is the result of an unsuccessful joke. During the summer of 1990, we were both participating in the Complex Systems Summer School of the Santa Fe Institute. Like many such programs dealing with " complexity, " this one was full of exciting examples of how it can be possible to recognize when apparently complex behavior has a simple(More)
system to date has served all of the needs of wearable computing—light weight, minimum effort, high power generation, convenient power delivery, and good power regulation. We believe that our approach has the potential to solve these problems for a class of wearable devices by placing both the generator and powered electronics in a location where(More)
Network protocols in layered architectures have historically been obtained on an ad hoc basis, and many of the recent cross-layer designs are conducted through piecemeal approaches. They may instead be holisti-cally analyzed and systematically designed as distributed solutions to some global optimization problems. This paper presents a survey of the recent(More)