Sciweavers

872 search results - page 94 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
ICMB
2005
IEEE
90views Business» more  ICMB 2005»
14 years 1 months ago
A Middleware-Based Script Language
Middleware has greatly promoted the 3-tie mode of application systems. But as application software requirements become more complex and more frequently changing, the development c...
Zaobin Gan, Ching Lin, Vijay Varadharajan
LPAR
2005
Springer
14 years 1 months ago
Functional Correctness Proofs of Encryption Algorithms
Abstract. We discuss a collection of mechanized formal proofs of symmetric key block encryption algorithms (AES, MARS, Twofish, RC6, Serpent, IDEA, and TEA), performed in an imple...
Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, K...
DATE
2003
IEEE
92views Hardware» more  DATE 2003»
14 years 1 months ago
A Low Device Occupation IP to Implement Rijndael Algorithm
This work presents a soft IP description of Rijndael, the Advanced Encryption Standard (AES) of National Institute of Standards and Technology (NIST). This Rijndael implementation...
Alex Panato, Marcelo Barcelos, Ricardo Augusto da ...
ICRA
2003
IEEE
156views Robotics» more  ICRA 2003»
14 years 1 months ago
TopBot: automated network topology detection with a mobile robot
Abstract— We have demonstrated that a properlyequipped mobile robot can easily construct a detailed map of the wireless coverage of an urban environment. The Autonomous Vehicle f...
Paul Blaer, Peter K. Allen
ISCAS
2003
IEEE
79views Hardware» more  ISCAS 2003»
14 years 1 months ago
Computation reduction in cascaded DCT-domain video downscaling transcoding
In this paper, we propose efficient techniques and architectures for realizing spatial-downscaling transcoders in the DCT domain. We also present methods for re-sampling motion ve...
Yuh-Ruey Lee, Chia-Wen Lin, Yen-Wen Chen