Sciweavers

438 search results - page 58 / 88
» date 2009
Sort
View
DAC
2009
ACM
16 years 6 months ago
The day Sherlock Holmes decided to do EDA
Semiconductor design companies are in a continuous search for design tools that address the ever increasing chip design complexity coupled with strict time-to-market schedules and...
Andreas G. Veneris, Sean Safarpour
EUROCRYPT
2009
Springer
16 years 6 months ago
Cryptanalysis of MDC-2
We provide a collision attack and preimage attacks on the MDC-2 construction, which is a method (dating back to 1988) of turning an n-bit block cipher into a 2n-bit hash function. ...
Christian Rechberger, Florian Mendel, Lars R. Knud...
HICSS
2009
IEEE
196views Biometrics» more  HICSS 2009»
16 years 6 days ago
Monetizing the Internet: Surely There Must be Something other than Advertising
Almost all attempts to monetize internet applications targeted at individuals to date have focused on natural extensions of traditional media or traditional retailing. Most are ei...
Eric K. Clemons
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
16 years 6 days ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
CCECE
2009
IEEE
16 years 5 days ago
An ultra compact block cipher for serialized architecture implementations
In this paper, we present a new block cipher, referred as PUFFIN2, that is designed to be used with applications requiring very low circuit area. PUFFIN2 is designed to be impleme...
Cheng Wang, Howard M. Heys