Sciweavers

221 search results - page 8 / 45
» The Effects of Multiple Algorithms in the Advanced Encryptio...
Sort
View
DICTA
2007
13 years 10 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
13 years 8 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
WWW
2005
ACM
14 years 9 months ago
Advanced fault analysis in web service composition
Currently, fault management in Web Services orchestrating multiple suppliers relies on a local analysis, that does not span across individual services, thus limiting the effective...
Anna Goy, Claudia Picardi, Daniele Theseider Dupr&...
CHES
2007
Springer
118views Cryptology» more  CHES 2007»
14 years 17 days ago
AES Encryption Implementation and Analysis on Commodity Graphics Processing Units
Graphics Processing Units (GPUs) present large potential performance gains within stream processing applications over the standard CPU. These performance gains are best realised wh...
Owen Harrison, John Waldron
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
14 years 2 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...