Sciweavers

650 search results - page 59 / 130
» Distorting symmetric designs
Sort
View
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
14 years 3 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 2 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
ASIACRYPT
2003
Springer
14 years 2 months ago
The Secret and Beauty of Ancient Chinese Padlocks
Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, ...
Hong-Sen Yan, Hsing-Hui Huang
ACISP
2000
Springer
14 years 1 months ago
An Implementation of Bitsliced DES on the Pentium MMXTM Processor
In this paper we describe an implementation of the DES (and Triple-DES) algorithm using the bitslicing technique on an Intel Pentium MMX processor. Implementation specifics are di...
Lauren May, Lyta Penna, Andrew Clark
FPGA
2008
ACM
173views FPGA» more  FPGA 2008»
13 years 10 months ago
The amorphous FPGA architecture
This paper describes the Amorphous FPGA, an innovative architecture attempting to optimally allocate logic and routing resource on per-mapping basis. Designed for high performance...
Mingjie Lin