Sciweavers

8 search results - page 2 / 2
» Generating a Power of an Operand by a Table Look-up and a Mu...
Sort
View
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
14 years 5 days ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
ICCAD
2005
IEEE
127views Hardware» more  ICCAD 2005»
14 years 3 months ago
Flip-flop insertion with shifted-phase clocks for FPGA power reduction
— Although the LUT (look-up table) size of FPGAs has been optimized for general applications, complicated designs may contain a large number of cascaded LUTs between flip-flops...
Hyeonmin Lim, Kyungsoo Lee, Youngjin Cho, Naehyuck...
SASN
2005
ACM
14 years 15 days ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava