Sciweavers

35 search results - page 2 / 7
» ae 2009
Sort
View
ISPEC
2011
Springer
12 years 8 months ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
CSE
2009
IEEE
13 years 6 months ago
Efficient Translation of Algorithmic Kernels on Large-Scale Multi-cores
In this paper we present the design of a novel embedded processor architecture (which we call a
Amit Pande, Joseph Zambreno
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 6 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
AE
2009
Springer
13 years 6 months ago
On-Line, On-Board Evolution of Robot Controllers
This paper reports on a feasibility study into the evolution of robot controllers during the actual operation of robots (on-line), using only the computational resources within the...
Nicolas Bredeche, Evert Haasdijk, A. E. Eiben
ICN
2009
Springer
14 years 6 days ago
jSon: Network of Active Elements with Peer-to-Peer Control Plane
In this paper, we describe and evaluate a scalable network of Active Elements (AE) that implements userempowered virtual-multicast overlay network for synchronous data distributio...
Michal Procházka, Petr Holub, Eva Hladk&aac...