Sciweavers

134 search results - page 10 / 27
» The First Experimental Cryptanalysis of the Data Encryption ...
Sort
View
CANDC
2006
ACM
13 years 7 months ago
Detecting and aligning peaks in mass spectrometry data with applications to MALDI
In this paper, we address the peak detection and alignment problem in the analysis of mass spectrometry data. To deal with the peak redundancy problem existing in the MALDI data a...
Weichuan Yu, Baolin Wu, Ning Lin, Kathy Stone, Ken...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 11 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
WWW
2004
ACM
14 years 8 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
CASES
2009
ACM
14 years 4 days ago
Side channel analysis of AVR XMEGA crypto engine
AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel atta...
Ilya Kizhvatov
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
13 years 11 months ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj