Sciweavers

6574 search results - page 40 / 1315
» Current Signatures: Application
Sort
View
FPL
2008
Springer
131views Hardware» more  FPL 2008»
14 years 6 days ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
14 years 4 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
ISCAS
2007
IEEE
129views Hardware» more  ISCAS 2007»
14 years 5 months ago
ECC Processor with Low Die Size for RFID Applications
Abstract— This paper presents the design of a special purpose processor with Elliptic Curve Digital Signature Algorithm (ECDSA) functionality. This digital signature generation d...
Franz Fürbass, Johannes Wolkerstorfer
ICIP
2004
IEEE
15 years 8 days ago
Authentication of MPEG-4-based surveillance video
The industry is currently starting to use MPEG-4 compressed digital video for surveillance applications. The transition from analog to digital video raises difficulties for using ...
Michael Pramateftakis, Tobias Oelbaum, Klaus Diepo...
QSIC
2007
IEEE
14 years 5 months ago
A Pattern-Based Constraint Description Approach for Web Services
Current WSDL-based description specifies only the operation signatures and locations of Web services. It is widely recognized that a richer description is needed. WS-Security, WS-...
Qianxiang Wang, Min Li, Na Meng, Yonggang Liu, Hon...