Sciweavers

623 search results - page 91 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 7 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
111
Voted
SIGUCCS
2000
ACM
15 years 7 months ago
From VTs to iMacs: Moving Public Computing Access into the 21st Century
In a Collegiate setting, technology must be functional, effective, and highly visible. In the fall of 1999 the CIS department at Bowdoin College saw the need for a greater number ...
Robert Denton, Patrick Jensen
153
Voted
EUC
2007
Springer
15 years 7 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
131
Voted
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
15 years 4 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
150
Voted
ASPDAC
2007
ACM
95views Hardware» more  ASPDAC 2007»
15 years 7 months ago
Simultaneous Control of Subthreshold and Gate Leakage Current in Nanometer-Scale CMOS Circuits
Power gating has been widely used to reduce subthreshold leakage. However, its efficiency degrades very fast with technology scaling due to the gate leakage of circuits specific t...
Youngsoo Shin, Sewan Heo, Hyung-Ock Kim, Jung Yun ...