Sciweavers

488 search results - page 24 / 98
» Policy-Based Cryptography and Applications
Sort
View
DATE
2003
IEEE
88views Hardware» more  DATE 2003»
14 years 21 days ago
Ubiquitous Access to Reconfigurable Hardware: Application Scenarios and Implementation Issues
This paper presents an approach for the integration of reconfigurable hardware and computer applications based on the concept of ubiquitous computing. The goal is to allow a netwo...
Leandro Soares Indrusiak, Florian Lubitz, Ricardo ...
JUCS
2007
107views more  JUCS 2007»
13 years 7 months ago
New Advances in Reconfigurable Computing and its Applications
: In this work we present a survey of different papers about reconfigurable computing and its applications. These papers treat very different reconfigurable-computing applications:...
Miguel A. Vega-Rodríguez, Juan Antonio G&oa...
CHES
2005
Springer
83views Cryptology» more  CHES 2005»
14 years 28 days ago
Fast Truncated Multiplication for Cryptographic Applications
The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms...
Laszlo Hars
CHES
2004
Springer
128views Cryptology» more  CHES 2004»
14 years 24 days ago
Long Modular Multiplication for Cryptographic Applications
Abstract. A digit-serial, multiplier-accumulator based cryptographic coprocessor architecture is proposed, similar to fix-point DSP's with enhancements, supporting long modula...
Laszlo Hars
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
13 years 11 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway