Sciweavers

216 search results - page 15 / 44
» High performance encryption cores for 3G networks
Sort
View
CSE
2011
IEEE
12 years 8 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
ACMSE
2004
ACM
14 years 1 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
INDOCRYPT
2004
Springer
14 years 1 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
SIGMOD
2001
ACM
135views Database» more  SIGMOD 2001»
14 years 8 months ago
The Network is the Database: Data Management for Highly Distributed Systems
This paper describes the methodology and implementation of a data management system for highly distributed systems, which was built to solve the scalability and reliability proble...
Julio C. Navas, Michael J. Wynblatt
EWSN
2009
Springer
14 years 9 months ago
SRCP: Simple Remote Control for Perpetual High-Power Sensor Networks
Remote management is essential for wireless sensor networks (WSNs) designed to run perpetually using harvested energy. A natural division of function for managing WSNs is to employ...
Navin Sharma, Jeremy Gummeson, David Irwin, Prasha...