Sciweavers

562 search results - page 5 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
IDTRUST
2009
ACM
15 years 6 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
FDL
2007
IEEE
15 years 3 months ago
A Domain Specific Language for Cryptography
In this paper, we propose a domain specific language for the development of hardware/software cryptographic systems based on the well known Python programming language. It is desi...
Giovanni Agosta, Gerardo Pelosi
ARCS
2004
Springer
15 years 5 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
GECCO
2007
Springer
175views Optimization» more  GECCO 2007»
15 years 5 months ago
An evolutionary multiobjective approach to design highly non-linear Boolean functions
The proliferation of all kinds of devices with different security requirements and constraints, and the arms-race nature of the security problem are increasingly demanding the de...
Hernán E. Aguirre, Hiroyuki Okazaki, Yasush...
GECCO
2007
Springer
169views Optimization» more  GECCO 2007»
15 years 5 months ago
An evolutionary platform for developing next-generation electronic circuits
In this paper, a new method for evolving simple electronic circuits is discussed, with the aim of improving the reliability and performance of basic circuit blocks. Next-generatio...
James A. Hilder, Andy M. Tyrrell