Sciweavers

1369 search results - page 179 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ITICSE
2005
ACM
15 years 4 months ago
Testing first: emphasizing testing in early programming courses
The complexity of languages like Java and C++ can make introductory programming classes in these languages extremely challenging for many students. Part of the complexity comes fr...
Will Marrero, Amber Settle
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
15 years 4 months ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
AGILEDC
2009
IEEE
15 years 4 months ago
Easing Team Politics in Agile Usability: A Concept Mapping Approach
— Team politics complicate software projects. They cause internal conflicts that can not only cost a software team time and money, but may also detract from the needs of the prod...
Jeremy T. Barksdale, Eric D. Ragan, D. Scott McCri...
AUIC
2000
IEEE
15 years 3 months ago
Supporting Special-Purpose Health Care Models via Web Interfaces
The potential of the Web, via both the Internet and intranets, to facilitate development of clinical information systems has been evident for some time. Most Web-based clinical wo...
James R. Warren, Heath K. Frankel, Joseph T. Noone...
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
15 years 3 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...