Sciweavers

562 search results - page 4 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
ICES
2007
Springer
70views Hardware» more  ICES 2007»
15 years 1 months ago
Evolutionary Design of Generic Combinational Multipliers Using Development
Combinational multipliers represent a class of circuits that is usually considered to be hard to design by means of the evolutionary techniques. However, experiments conducted unde...
Michal Bidlo
POPL
2008
ACM
15 years 12 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
15 years 3 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
CEC
2010
IEEE
15 years 21 days ago
A modified Invasive Weed Optimization algorithm for time-modulated linear antenna array synthesis
: Time modulated antenna arrays attracted the attention of researchers for the synthesis of low/ultra-low side lobes in recent past. In this article we propose an improved variant ...
Aniruddha Basak, Siddharth Pal, Swagatam Das, Ajit...
LATINCRYPT
2010
14 years 10 months ago
Fixed Argument Pairings
A common scenario in many pairing-based cryptographic protocols is that one argument in the pairing is fixed as a long term secret key or a constant parameter in the system. In th...
Craig Costello, Douglas Stebila