This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and ...
K. Saleem, Norsheila Fisal, M. S. Abdullah, A. B. ...
Every public-key encryption scheme has to incorporate a certain amount of randomness into its ciphertexts to provide semantic security against chosen ciphertext attacks (IND-CCA). ...
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...