Sciweavers

438 search results - page 11 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
14 years 29 days ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw
ACIIDS
2009
IEEE
160views Database» more  ACIIDS 2009»
13 years 5 months ago
Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov Method
This study presents an H controller design for time-delay Takagi-Sugeno (T-S) fuzzy systems based on the fuzzy Lyapunov method, which is defined in terms of fuzzy blending quadrati...
Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin, Chen-Yuan Che...
VTC
2007
IEEE
14 years 1 months ago
Mellin Transform Based Performance Analysis of FFH M-ary FSK Using Product Combining Against Partial Band Noise Jamming
— We propose a novel bit error ratio (BER) analysis technique for fast frequency hopping (FFH) assisted M-ary frequency shift keying (MFSK) using product combining (PC), when the...
Sohail Ahmed, Lie-Liang Yang, Lajos Hanzo
ASPLOS
2000
ACM
13 years 12 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
SAMOS
2007
Springer
14 years 1 months ago
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and
Abstract— This paper explores the resistance of MOS Current Mode Logic (MCML) against Differential Power Analysis (DPA) attacks. Circuits implemented in MCML, in fact, have uniqu...
Francesco Regazzoni, Stéphane Badel, Thomas...