Sciweavers

TCOS
2010
13 years 5 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
ECIS
2003
14 years 2 days ago
Politics in packaged software implementation
The academic literature relating to the political issues of information systems is fairly well established. However, there are relatively few empirical studies relating to the pol...
Christopher Bull
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
14 years 2 months ago
Closing the Gap Between Software Modelling and Code
If a software implementation is to be generated fully automatically from a model, then the model must be detailed and totally complete. For the definition of software implementing...
Ferdinand Wagner, T. Wagner, Peter Wolstenholme
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 3 months ago
Designing Complex Software Implementation Programs
The central question of this paper is: How can design of Program Management contribute to the success of complex software implementations? Incomplete goal specifications, lack of ...
Pieter M. A. Ribbers, Klaus-Clemens Schoo
ITCC
2005
IEEE
14 years 4 months ago
AES Power Attack Based on Induced Cache Miss and Countermeasure
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus indu...
Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri...
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
14 years 5 months ago
Mapping the physical layer of radio standards to multiprocessor architectures
We are concerned with the software implementation of baseband processing for the physical layer of radio standards (“Software Defined Radio - SDR”). Given the constraints for ...
Cyprian Grassmann, Mathias Richter, Mirko Sauerman...
MEMOCODE
2008
IEEE
14 years 5 months ago
High-throughput Pipelined Mergesort
Abstract: We present an implementation of a highthroughput cryptosorter, capable of sorting an encrypted database of eight megabytes in .15 seconds; 1102 times faster than a softwa...
Kermin Fleming, Myron King, Man Cheuk Ng, Asif Kha...