Sciweavers

472 search results - page 80 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
CISC
2005
Springer
120views Cryptology» more  CISC 2005»
14 years 3 months ago
Towards a General RC4-Like Keystream Generator
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64bit words but using original RC4 with 32/64 bits is in...
Guang Gong, Kishan Chand Gupta, Martin Hell, Yassi...
LCPC
2004
Springer
14 years 3 months ago
Power-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...
Yung-Chia Lin, Yi-Ping You, Chung-Wen Huang, Jenq ...
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 3 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 3 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
TRUST
2010
Springer
14 years 2 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman