Sciweavers

562 search results - page 11 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
110
Voted
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 6 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
98
Voted
TPDS
2008
92views more  TPDS 2008»
14 years 11 months ago
Topology Design of Network-Coding-Based Multicast Networks
It is anticipated that a large amount of multicast traffic needs to be supported in future communication networks. The network coding technique proposed recently is promising for e...
Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi, Miny...
GECCO
2005
Springer
190views Optimization» more  GECCO 2005»
15 years 5 months ago
An efficient evolutionary algorithm applied to the design of two-dimensional IIR filters
This paper presents an efficient technique of designing twodimensional IIR digital filters using a new algorithm involving the tightly coupled synergism of particle swarm optimiza...
Swagatam Das, Amit Konar, Uday Kumar Chakraborty
89
Voted
IH
2004
Springer
15 years 5 months ago
On the Possibility of Non-invertible Watermarking Schemes
Recently, there are active discussions on the possibility of non-invertible watermarking scheme. A non-invertible scheme prevents an attacker from deriving a valid watermark from a...
Qiming Li, Ee-Chien Chang
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
15 years 3 months ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj