Sciweavers

562 search results - page 4 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
ICES
2007
Springer
70views Hardware» more  ICES 2007»
13 years 7 months ago
Evolutionary Design of Generic Combinational Multipliers Using Development
Combinational multipliers represent a class of circuits that is usually considered to be hard to design by means of the evolutionary techniques. However, experiments conducted unde...
Michal Bidlo
POPL
2008
ACM
14 years 6 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
13 years 9 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
CEC
2010
IEEE
13 years 7 months ago
A modified Invasive Weed Optimization algorithm for time-modulated linear antenna array synthesis
: Time modulated antenna arrays attracted the attention of researchers for the synthesis of low/ultra-low side lobes in recent past. In this article we propose an improved variant ...
Aniruddha Basak, Siddharth Pal, Swagatam Das, Ajit...
LATINCRYPT
2010
13 years 4 months ago
Fixed Argument Pairings
A common scenario in many pairing-based cryptographic protocols is that one argument in the pairing is fixed as a long term secret key or a constant parameter in the system. In th...
Craig Costello, Douglas Stebila