A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
MRD Hashing
[chapter]
1998
Lecture Notes in Computer Science
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication. ...
We place an electronic version of this journal in the public domain one year after publication. ...
The result, with a 32 round cipher in which the DES S-boxes are reused a row at a time, is a cipher that is about as fast as DES but more secure against known attacks than triple DES.
071505`JEROBOAM ...
doi:10.1007/3-540-69710-1_10
fatcat:mezaspbmk5c4nhu227gayoeejq
A Survey of Coarse-Grained Reconfigurable Architecture and Design
2019
ACM Computing Surveys
This article reviews the architecture and design of CGRAs thoroughly for the purpose of exploiting their full potential. First, a novel multidimensional taxonomy is proposed. ...
However, CGRAs are not yet mature in terms of programmability, productivity, and adaptability. ...
A method based on the Benes network was proposed in Reference [170] as a random infection countermeasure for block ciphers against fault attacks. ...
doi:10.1145/3357375
fatcat:pqi4d33i6bg45a6llswhwd44qi
Evil Offspring - Ransomware and Crypto Technology
2016
IEEE Internet Computing
A strategy for managing cryptographic keys is only the first defense against data breaches. ...
The operational characteristics of encryption processes could be used against it. For example, the repetitive loop of the AES cipher could be detected by runtime execution monitors. ...
CAREER OPPORTUNITIES
The University of Alabama in Huntsville The Department of Computer Science of The University of Alabama in Huntsville (UAH) invites applicants for a tenure-track faculty position ...
doi:10.1109/mic.2016.90
fatcat:v5zmzx7qrba5dkqxweoo3ifvry
Detection and Evaluation of Clusters within Sequential Data
[article]
2022
arXiv
pre-print
Motivated by theoretical advancements in dimensionality reduction techniques we use a recent model, called Block Markov Chains, to conduct a practical study of clustering in real-world sequential data. ...
In order to evaluate the determined clusters, and the associated Block Markov Chain model, we further develop a set of evaluation tools. ...
We would finally like to thank Mike van Santvoort for useful discussions while writing this paper. ...
arXiv:2210.01679v1
fatcat:jgoimy2edbb35ih4cjwjkveexy
2016 Jahresbericht Annual Report
unpublished
We organizers are all thankful to the participants, who all brought a unique insight to the seminar, which in my humble opinion, succeeded in its aims. ...
The organisers would like to express their gratitude to the participants and the Schloss Dagstuhl team for a productive and exciting seminar. ...
In addition, the design of a countermeasure effective against most forms of tampering is an open research issue. Technology effects on implementation attacks. ...
fatcat:oef4sw3ebbcwhe7qbtizni4lfy