Sciweavers

472 search results - page 71 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
14 years 4 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta
IEEEARES
2006
IEEE
14 years 3 months ago
Secure 3G User Authentication in Adhoc Serving Networks
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a pr...
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard...
CIBCB
2005
IEEE
14 years 3 months ago
An Internet-based Melanoma Diagnostic System - Toward the Practical Application
— In this paper, we report a practical application of world’s first internet-based melanoma diagnostic system. The system is now available from all over the world, 24 hours 36...
Hitoshi Iyatomi, Hiroshi Oka, Masahiro Hashimoto, ...
ASWEC
2007
IEEE
14 years 1 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li
GLVLSI
2007
IEEE
166views VLSI» more  GLVLSI 2007»
14 years 1 months ago
Efficient pipelining for modular multiplication architectures in prime fields
This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation o...
Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid...