Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5 Hits in 7.0 sec

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication.  ...  We place an electronic version of this journal in the public domain one year after publication.  ...  The result, with a 32 round cipher in which the DES S-boxes are reused a row at a time, is a cipher that is about as fast as DES but more secure against known attacks than triple DES. 071505`JEROBOAM  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

A Survey of Coarse-Grained Reconfigurable Architecture and Design

Leibo Liu, Jianfeng Zhu, Zhaoshi Li, Yanan Lu, Yangdong Deng, Jie Han, Shouyi Yin, Shaojun Wei
2019 ACM Computing Surveys  
This article reviews the architecture and design of CGRAs thoroughly for the purpose of exploiting their full potential. First, a novel multidimensional taxonomy is proposed.  ...  However, CGRAs are not yet mature in terms of programmability, productivity, and adaptability.  ...  A method based on the Benes network was proposed in Reference [170] as a random infection countermeasure for block ciphers against fault attacks.  ... 
doi:10.1145/3357375 fatcat:pqi4d33i6bg45a6llswhwd44qi

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
A strategy for managing cryptographic keys is only the first defense against data breaches.  ...  The operational characteristics of encryption processes could be used against it. For example, the repetitive loop of the AES cipher could be detected by runtime execution monitors.  ...  CAREER OPPORTUNITIES The University of Alabama in Huntsville The Department of Computer Science of The University of Alabama in Huntsville (UAH) invites applicants for a tenure-track faculty position  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

Detection and Evaluation of Clusters within Sequential Data [article]

Alexander Van Werde, Albert Senen-Cerda, Gianluca Kosmella, Jaron Sanders
2022 arXiv   pre-print
Motivated by theoretical advancements in dimensionality reduction techniques we use a recent model, called Block Markov Chains, to conduct a practical study of clustering in real-world sequential data.  ...  In order to evaluate the determined clusters, and the associated Block Markov Chain model, we further develop a set of evaluation tools.  ...  We would finally like to thank Mike van Santvoort for useful discussions while writing this paper.  ... 
arXiv:2210.01679v1 fatcat:jgoimy2edbb35ih4cjwjkveexy

2016 Jahresbericht Annual Report

Jähnichen Stefan, Raimund Geschäftsführung, Seidel, Meißner Heike, Gesellschafter
unpublished
We organizers are all thankful to the participants, who all brought a unique insight to the seminar, which in my humble opinion, succeeded in its aims.  ...  The organisers would like to express their gratitude to the participants and the Schloss Dagstuhl team for a productive and exciting seminar.  ...  In addition, the design of a countermeasure effective against most forms of tampering is an open research issue. Technology effects on implementation attacks.  ... 
fatcat:oef4sw3ebbcwhe7qbtizni4lfy