Sciweavers

51 search results - page 4 / 11
» aes 2006
Sort
View
ENTCS
2006
163views more  ENTCS 2006»
13 years 7 months ago
Design Challenges for a Differential-Power-Analysis Aware GALS-based AES Crypto ASIC
In recent years several successful GALS realizations have been presented. The core of a GALS system is a locally synchronous island that is designed using industry standard synchr...
Frank K. Gürkaynak, Stephan Oetiker, Hubert K...
AES
2006
Springer
97views Cryptology» more  AES 2006»
13 years 7 months ago
ADSS: An approach to determining semantic similarity
Determining the semantic similarity is an important issue in the development of semantic search technology. In this paper, we propose an approach to determining the semantic simil...
Lixin Han, Linping Sun, Guihai Chen, Li Xie
CSREAEEE
2007
136views Business» more  CSREAEEE 2007»
13 years 9 months ago
Virtual Apparatus Framework Approach to Constructing Adaptive Tutorials
- We present the Adaptive eLearning Platform (AeLP) – a platform solution for creating rich, interactive, and highly visual, adaptive eLearning activities designed using Virtual ...
Dror Ben-Naim, Nadine Marcus, Michael Bain
JCT
2010
93views more  JCT 2010»
13 years 6 months ago
Ramanujan's lost notebook: Combinatorial proofs of identities associated with Heine's transformation or partial theta functions
Combinatorial proofs are given for certain entries in Ramanujan’s lost notebook. Bijections of Sylvester, Franklin, Wright, and Yee are employed. A new bijection, involving the n...
Bruce C. Berndt, Byungchan Kim, Ae Ja Yee
IEICET
2006
84views more  IEICET 2006»
13 years 7 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda