Sciweavers

438 search results - page 16 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
ISBI
2011
IEEE
12 years 11 months ago
Atlas-based fiber clustering for multi-subject analysis of high angular resolution diffusion imaging tractography
High angular resolution diffusion imaging (HARDI) allows in vivo analysis of the white matter structure and connectivity. Based on orientation distribution functions (ODFs) that r...
Gautam Prasad, Neda Jahanshad, Iman Aganj, Christo...
FSE
2003
Springer
137views Cryptology» more  FSE 2003»
14 years 21 days ago
Turing: A Fast Stream Cipher
Abstract. This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFS...
Gregory G. Rose, Philip Hawkes
TVLSI
2008
108views more  TVLSI 2008»
13 years 7 months ago
Unified Convolutional/Turbo Decoder Design Using Tile-Based Timing Analysis of VA/MAP Kernel
To satisfy the advanced forward-error-correction (FEC) standards, in which the Convolutional code and Turbo code may co-exit, a prototype design of a unified Convolutional/Turbo de...
Fan-Min Li, Cheng-Hung Lin, An-Yeu Wu
ENTCS
2006
163views more  ENTCS 2006»
13 years 7 months ago
Design Challenges for a Differential-Power-Analysis Aware GALS-based AES Crypto ASIC
In recent years several successful GALS realizations have been presented. The core of a GALS system is a locally synchronous island that is designed using industry standard synchr...
Frank K. Gürkaynak, Stephan Oetiker, Hubert K...
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 27 days ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois