Sciweavers

5762 search results - page 30 / 1153
» R-tree: A Hardware Implementation
Sort
View
CTRSA
2005
Springer
108views Cryptology» more  CTRSA 2005»
14 years 2 months ago
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
This work proposes a compact implementation of the AES S-box using composite field arithmetic in GF(((22 ) 2 ) 2 ). It describes a systematic exploration of different choices for...
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid V...
CIBCB
2006
IEEE
14 years 2 months ago
Iris Recognition Algorithm Optimized for Hardware Implementation
: Iris recognition is accepted as one of the most efficient biometric method. Implementing this method to the practical system requires the special image preprocessing where the ir...
Kamil Grabowski, Wojciech Sankowski, Malgorzata Na...
JSA
2007
139views more  JSA 2007»
13 years 8 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
WISA
2007
Springer
14 years 2 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede