Abstract— This paper presents an analog implementation of the complex wavelet transform using both the complex first order system (CFOS) and the Pad´e approximation. The comple...
Sandro A. P. Haddad, J. M. H. Karel, Ralf L. M. Pe...
Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core comp...
Energy is a limited resource in wireless sensor networks. In fact, the reduction of power consumption is crucial to increase the lifetime of low power sensor networks. Several app...
— This paper proposes a new protocol for shuffling and dealing cards, that is designed specifically for games of mental poker. Our protocol takes advantage of two features of p...
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...