Sciweavers

8 search results - page 1 / 2
» cisc 2005
Sort
View
CODES
2005
IEEE
13 years 10 months ago
Enhanced code density of embedded CISC processors with echo technology
Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even ...
Youfeng Wu, Mauricio Breternitz Jr., Herbert H. J....
CISC
2005
Springer
107views Cryptology» more  CISC 2005»
13 years 6 months ago
A Remark on Implementing the Weil Pairing
We propose an improved implementation of modified Weil pairings. By reduction of operations in the extension field to those in the base field, we can save some operations in the...
Cheol-Min Park, Myung-Hwan Kim, Moti Yung
CISC
2005
Springer
129views Cryptology» more  CISC 2005»
13 years 10 months ago
HCTR: A Variable-Input-Length Enciphering Mode
This paper proposes a blockcipher mode of operation, HCTR, which is a length-preserving encryption mode. HCTR turns an n-bit blockcipher into a tweakable blockcipher that supports ...
Peng Wang, Dengguo Feng, Wenling Wu
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
13 years 10 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
CISC
2005
Springer
120views Cryptology» more  CISC 2005»
13 years 10 months ago
Towards a General RC4-Like Keystream Generator
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64bit words but using original RC4 with 32/64 bits is in...
Guang Gong, Kishan Chand Gupta, Martin Hell, Yassi...