Sciweavers

2213 search results - page 343 / 443
» Software Security
Sort
View
FPL
2004
Springer
143views Hardware» more  FPL 2004»
15 years 7 months ago
Exploring Area/Delay Tradeoffs in an AES FPGA Implementation
Abstract. Field-Programmable Gate Arrays (FPGAs) have lately become a popular target for implementing cryptographic block ciphers, as a well-designed FPGA solution can combine some...
Joseph Zambreno, David Nguyen, Alok N. Choudhary
CRYPTO
1995
Springer
111views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Fast Key Exchange with Elliptic Curve Systems
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field F2n. A software version of this using n = 155 can be o...
Richard Schroeppel, Hilarie K. Orman, Sean W. O'Ma...
174
Voted
ACSW
2007
15 years 4 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...
DAGSTUHL
2007
15 years 4 months ago
A Case for Deconstructing Hardware Transactional Memory Systems
Major hardware and software vendors are curious about transactional memory (TM), but are understandably cautious about committing to hardware changes. Our thesis is that deconstru...
Mark D. Hill, Derek Hower, Kevin E. Moore, Michael...
103
Voted
SE
2007
15 years 4 months ago
Integration models in a .NET plug-in framework
Abstract: Applications based on plug-in architectures are extensible through thirdparties and enable customized user environments. We argue that extensibility and customization are...
Reinhard Wolfinger, Herbert Prähofer