Sciweavers

67 search results - page 2 / 14
» crypto 2007
Sort
View
FDTC
2007
Springer
82views Cryptology» more  FDTC 2007»
13 years 11 months ago
Register Transfer Level Concurrent Error Detection in Elliptic Curve Crypto Implementations
Richard Stern, Nikhil Joshi, Kaijie Wu, Ramesh Kar...
ISCAS
2007
IEEE
149views Hardware» more  ISCAS 2007»
13 years 11 months ago
New Light-Weight Crypto Algorithms for RFID
— We propose a new block cipher, DESL (DES Lightweight
Axel Poschmann, Gregor Leander, Kai Schramm, Chris...
FPL
2007
Springer
154views Hardware» more  FPL 2007»
13 years 11 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
IJNSEC
2007
137views more  IJNSEC 2007»
13 years 4 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
CRYPTO
2007
Springer
104views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Converse...
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q....