Sciweavers

223 search results - page 33 / 45
» Suffix Arrays on Words
Sort
View
ISCAS
1993
IEEE
133views Hardware» more  ISCAS 1993»
13 years 11 months ago
An efficient FIR filter architecture
– This paper describes an efficient architecture for FIR filters. By exploiting the reduced complexity made possible by the use of sparse powers-of-two coefficients, an FIR ...
Joseph B. Evans
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
13 years 11 months ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
CHES
2006
Springer
74views Cryptology» more  CHES 2006»
13 years 11 months ago
Optically Enhanced Position-Locked Power Analysis
Abstract. This paper introduces a refinement of the power-analysis attack on integrated circuits. By using a laser to illuminate a specific area on the chip surface, the current th...
Sergei P. Skorobogatov
INTERACT
2003
13 years 8 months ago
Managing Multiple Passwords and Multiple Logins: MiFA
Internet users today who subscribe to many different accounts or subscriptions online face a bewildering array of logins and passwords to remember on security systems where usabil...
Bo Lu, Michael Twidale
ENTCS
2008
79views more  ENTCS 2008»
13 years 7 months ago
Tensors of Comodels and Models for Operational Semantics
In seeking a unified study of computational effects, in particular in order to give a general operational semantics agreeing with the standard one for state, one must take account...
Gordon D. Plotkin, John Power