Sciweavers

731 search results - page 117 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
76
Voted
ISW
2001
Springer
15 years 5 months ago
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator B
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic transformations in reconfigurable hardware. Full imp...
Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Sc...
MOC
2010
14 years 7 months ago
Optimizing the double description method for normal surface enumeration
Abstract. Many key algorithms in 3-manifold topology involve the enumeration of normal surfaces, which is based upon the double description method for finding the vertices of a con...
Benjamin A. Burton
109
Voted
EUROCRYPT
1990
Springer
15 years 4 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
77
Voted
VLSID
2002
IEEE
79views VLSI» more  VLSID 2002»
16 years 1 months ago
A Power Minimization Technique for Arithmetic Circuits by Cell Selection
As a basic cell of arithmetic circuits, a one-bit full adder and a counter are usually used. Minimizing power consumption of these components is a key issue for low-power circuit ...
Masanori Muroyama, Tohru Ishihara, Akihiko Hyodo, ...
94
Voted
NETWORKING
2004
15 years 2 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt