Sciweavers

384 search results - page 30 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
MM
2004
ACM
130views Multimedia» more  MM 2004»
15 years 7 months ago
An approach to interactive media system for mobile devices
The interactive system which interacts human with computer has been recognized as one direction of computer development for a long time. For example, in cinema, a person gets info...
Eun-Seok Ryu, Chuck Yoo
3DIM
2003
IEEE
15 years 5 months ago
Efficient Surface Reconstruction from Range Curves
This paper proposes an approach for surface reconstruction of free-form rigid objects from an arbitrary set of intersecting range curves. A strategy for updating the reconstructed...
Dragan Tubic, Patrick Hébert, Denis Laurend...
135
Voted
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
15 years 8 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
CHES
2007
Springer
165views Cryptology» more  CHES 2007»
15 years 8 months ago
FPGA Intrinsic PUFs and Their Use for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different approach to...
Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrij...
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 8 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...