Sciweavers

517 search results - page 28 / 104
» Bit Encryption Is Complete
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 1 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
CHES
2005
Springer
156views Cryptology» more  CHES 2005»
14 years 1 months ago
A Very Compact S-Box for AES
A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box.” Many implementations of AES have been proposed, for various goals, that effect the S-box in vari...
David Canright
FPL
2003
Springer
164views Hardware» more  FPL 2003»
14 years 1 months ago
FPGA Implementations of the RC6 Block Cipher
RC6 is a symmetric-key algorithm which encrypts 128-bit plaintext blocks to 128-bit ciphertext blocks. The encryption process involves four operations: integer addition modulo 2w ,...
Jean-Luc Beuchat
ITC
1996
IEEE
127views Hardware» more  ITC 1996»
14 years 6 days ago
Altering a Pseudo-Random Bit Sequence for Scan-Based BIST
This paper presents a low-overhead scheme for built-in self-test of circuits with scan. Complete (100%) fault coverage is obtained without modifying the function logic and without...
Nur A. Touba, Edward J. McCluskey
ACRI
2004
Springer
14 years 1 months ago
Block Encryption Using Reversible Cellular Automata
Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a local relation. They were successfully applied for s...
Marcin Seredynski, Pascal Bouvry