scispace - formally typeset
Search or ask a question
Author

Christian Kittl

Bio: Christian Kittl is an academic researcher. The author has contributed to research in topics: Security engineering & Engineering informatics. The author has an hindex of 2, co-authored 2 publications receiving 63 citations.

Papers
More filters
BookDOI
01 Jan 2013
TL;DR: This paper focuses on the conceptual benefits and risks such an integration of sensor data into social media in the case of a patient room and introduces a way to deal with these problems.
Abstract: In a hospital, information exchange is essential to save lives and to prevent life-endangering mistakes. Information exchange is supported by a hospital information system (HIS). From a theoretical perspective, the deployment of an HIS is promising because it reduces errors and duplication of information. In practice, however, there are some major problems concerning the usage of such a system. One way to deal with these problems is introduced in this paper: the integration of sensor data into social media. The paper concentrates on the conceptual benefits and risks such an integration may generate. It focuses on the case of a patient room.

47 citations

BookDOI
01 Jan 2013
TL;DR: This paper investigates the differential behavior of the cipher in detail and proposes (multiple) differential attack and boomerang attack against it and constructs 15-round multiple differential paths which can lead to 17-round attack with complexity as low as 2.
Abstract: LBlock is a lightweight block cipher proposed in ACNS 2011. It has a 64-bit block size and 80-bit key size which is the typical parameter setting accepted by most of the recent proposed lightweight block ciphers. It has fast hardware implementation efficiency and it still remains rather secure considering the recent results and the security margin it provides. In this paper, we investigate the differential behavior of the cipher in detail and propose (multiple) differential attack and boomerang attack against it. We are able to construct 15-round multiple differential paths which can lead to 17-round attack with complexity as low as 2. Also 16-round boomerang distinguisher can be build which leads us to 18-round boomerang (rectangle) attack with complexity 2 . These are the best differential attacks for LBlock in the single key scenario, which helps us understanding the differential behavior of the cipher.

16 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: Polanyi is at pains to expunge what he believes to be the false notion contained in the contemporary view of science which treats it as an object and basically impersonal discipline.
Abstract: The Study of Man. By Michael Polanyi. Price, $1.75. Pp. 102. University of Chicago Press, 5750 Ellis Ave., Chicago 37, 1959. One subtitle to Polanyi's challenging and fascinating book might be The Evolution and Natural History of Error , for Polanyi is at pains to expunge what he believes to be the false notion contained in the contemporary view of science which treats it as an object and basically impersonal discipline. According to Polanyi not only is this a radical and important error, but it is harmful to the objectives of science itself. Another subtitle could be Farewell to Detachment , for in place of cold objectivity he develops the idea that science is necessarily intensely personal. It is a human endeavor and human point of view which cannot be divorced from nor uprooted out of the human matrix from which it arises and in which it works. For a good while

2,248 citations