Sciweavers

930 search results - page 90 / 186
» A Universal Encryption Standard
Sort
View
IADIS
2004
13 years 11 months ago
Towards interoperability of wireless services - a description model of service interfaces
Web services are evolving quickly in terms of standardization. Technology and wireless networks exact requirements upon web services used via wireless connections, such as mobile ...
Anne Immonen, Jarkko Holappa, Päivi Kallio, J...
ISPEC
2011
Springer
13 years 28 days ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
CHI
2005
ACM
14 years 10 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
14 years 4 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
14 years 2 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...