Sciweavers

981 search results - page 59 / 197
» Advanced Encryption Standard
Sort
View
BIB
2006
172views more  BIB 2006»
13 years 9 months ago
Advances in the Exon-Intron Database (EID)
Investigation of exon^intron gene structures is a non-trivial task due to enormous expansions of the eukaryotic genomes, great variety of gene forms, and the imperfectness in sequ...
Valery Shepelev, Alexei Fedorov
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 3 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
EGH
2010
Springer
13 years 7 months ago
GPU random numbers via the tiny encryption algorithm
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) a...
Fahad Zafar, Marc Olano, Aaron Curtis
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
14 years 1 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
CORR
1998
Springer
131views Education» more  CORR 1998»
13 years 8 months ago
Influencing Software Usage
Technology designers often strive to design systems that are flexible enough to be used in a wide range of situations. Software engineers, in particular, are trained to seek gener...
Lorrie Faith Cranor, Rebecca N. Wright