Sciweavers

5762 search results - page 30 / 1153
» R-tree: A Hardware Implementation
Sort
View
CTRSA
2005
Springer
108views Cryptology» more  CTRSA 2005»
15 years 9 months ago
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
This work proposes a compact implementation of the AES S-box using composite field arithmetic in GF(((22 ) 2 ) 2 ). It describes a systematic exploration of different choices for...
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid V...
161
Voted
CIBCB
2006
IEEE
15 years 10 months ago
Iris Recognition Algorithm Optimized for Hardware Implementation
: Iris recognition is accepted as one of the most efficient biometric method. Implementing this method to the practical system requires the special image preprocessing where the ir...
Kamil Grabowski, Wojciech Sankowski, Malgorzata Na...
JSA
2007
139views more  JSA 2007»
15 years 3 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
112
Voted
WISA
2007
Springer
15 years 10 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
82
Voted
EUROPAR
2009
Springer
15 years 10 months ago
Hardware Implementation Study of the SCFQ-CA and DRR-CA Scheduling Algorithms
Raúl Martínez, Francisco José...