Sciweavers

2945 search results - page 16 / 589
» Designing and Implementing Malicious Hardware
Sort
View
FPL
2004
Springer
81views Hardware» more  FPL 2004»
15 years 5 months ago
Design and Implementation of the Memory Scheduler for the PC-Based Router
Tomás Marek, Martin Novotný, Ludek C...
ARC
2009
Springer
241views Hardware» more  ARC 2009»
15 years 6 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro