Sciweavers

925 search results - page 67 / 185
» Implementing Function Block Adapters
Sort
View
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
JCP
2008
120views more  JCP 2008»
13 years 10 months ago
High Throughput VLSI Architecture for Blackman Windowing in Real Time Spectral Analysis
This paper presents a high throughput VLSI architecture for Blackman windowing. Since most of the implementation of windowing functions for real time applications, are based on eit...
Kailash Chandra Ray, A. S. Dhar
IACR
2011
252views more  IACR 2011»
12 years 9 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
IPPS
1995
IEEE
14 years 1 months ago
Index translation schemes for adaptive computations on distributed memory multicomputers
Current research in parallel programming is focused on closing the gap between globally indexed algorithms and the separate address spaces of processors on distributed memory mult...
Bongki Moon, Mustafa Uysal, Joel H. Saltz
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
13 years 11 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...