Sciweavers

8874 search results - page 56 / 1775
» A New Implementation of Automath
Sort
View
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
14 years 2 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...
SCN
2008
Springer
13 years 11 months ago
Using Normal Bases for Compact Hardware Implementations of the AES S-Box
Abstract. The substitution box (S-box) of the Advanced Encryption Standard (AES) is based on the multiplicative inversion s(x) = x-1 in GF(256) and followed by an affine transforma...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
ITCC
2003
IEEE
14 years 4 months ago
Networking in the New ICT Curricula
New guidelines for ICT curricula have recently appeared, both in Europe and the United States. New European guidelines are sponsored by the European Commission and are a consequen...
Josep Domingo-Ferrer
SIGCSE
2009
ACM
82views Education» more  SIGCSE 2009»
14 years 11 months ago
An experience report on the design and delivery of two new software design courses
In this paper, we report on our experience in designing and delivering two new software design courses in the Informatics major at UC Irvine. When the major was created in 2004, i...
Alex Baker, André van der Hoek
VLDB
2008
ACM
196views Database» more  VLDB 2008»
14 years 11 months ago
Modelling retrieval models in a probabilistic relational algebra with a new operator: the relational Bayes
This paper presents a probabilistic relational modelling (implementation) of the major probabilistic retrieval models. Such a high-level implementation is useful since it supports ...
Thomas Rölleke, Hengzhi Wu, Jun Wang, Hany Azzam