Sciweavers

1045 search results - page 173 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
CC
2007
Springer
109views System Software» more  CC 2007»
14 years 1 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
SACRYPT
2007
Springer
14 years 1 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
14 years 1 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
ICMCS
2006
IEEE
82views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Low-Complexity Adaptive Block-Size Transform Based on Extended Transforms
In this paper, a low-complexity 8x8/4x4 Adaptive Blocksize Transform (ABT) scheme is tentatively proposed for the Chinese Audio and Video coding Standard (AVS)1 . In the proposed ...
Honggang Qi, Wen Gao, Siwei Ma, Debin Zhao, Xiangy...
ICMCS
2006
IEEE
82views Multimedia» more  ICMCS 2006»
14 years 1 months ago
PING: a Group-to-Individual Distributed Meeting System
Group-to-individual (G2I) distributed meeting is an important but understudied area. Because of the asymmetry between different parties in G2I meetings, it has two unique challeng...
Yong Rui, Eric Rudolph, Li-wei He, Rico Malvar, Mi...