Sciweavers

872 search results - page 64 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
LCPC
2000
Springer
13 years 11 months ago
Improving Offset Assignment for Embedded Processors
Embedded systems consisting of the application program ROM, RAM, the embedded processor core, and any custom hardware on a single wafer are becoming increasingly common in applicat...
Sunil Atri, J. Ramanujam, Mahmut T. Kandemir
COMCOM
2006
165views more  COMCOM 2006»
13 years 7 months ago
Analysis of a topology control paradigm in WLAN/WPAN environments
The coordinated coexistence of WLANs and WPANs in a dual-mode network is a recently introduced idea and is expected to increase the overall system performance by allowing for the ...
Athanasios Vaios, Konstantinos Oikonomou, Ioannis ...
ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 5 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 2 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...