Sciweavers

103 search results - page 21 / 21
» Cryptographic Functions and Design Criteria for Block Cipher...
Sort
View
TVLSI
2008
197views more  TVLSI 2008»
13 years 5 months ago
Leakage Minimization of SRAM Cells in a Dual-Vt and Dual-Tox Technology
-- Aggressive CMOS scaling results in low threshold voltage and thin oxide thickness for transistors manufactured in deep submicron regime. As a result, reducing the subthreshold a...
Behnam Amelifard, Farzan Fallah, Massoud Pedram
IESS
2007
Springer
156views Hardware» more  IESS 2007»
13 years 11 months ago
Automatic Data Path Generation from C code for Custom Processors
The stringent performance constraints and short time to market of modern digital systems require automatic methods for design of high performance applicationspeciļ¬c architectures...
Jelena Trajkovic, Daniel Gajski
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...