نتایج جستجو برای: lightweight

تعداد نتایج: 21156  

Journal: :IACR Cryptology ePrint Archive 2016
Sumanta Sarkar Siang Meng Sim

In this paper, we study the behavior of the XOR count distributions under different bases of finite field. XOR count of a field element is a simplified metric to estimate the hardware implementation cost to compute the finite field multiplication of an element. It is an important criterion in the design of lightweight cryptographic primitives, typically to estimate the efficiency of the diffusi...

2011
Mehmet Ucar Youjiang Wang

Purpose – A large amount of post-consumer carpet waste is discarded into landfills. The need to recycle this waste is increasing due to the lack of available landfill spaces in many parts of the world, environmental concerns, and resource conservation. The purpose of this paper is to explore the use of this waste for a low-cost, high-volume application. Design/methodology/approach – Fibers from...

Journal: :CoRR 2011
Jan Treibig Georg Hager Gerhard Wellein

Exploiting the performance of today’s microprocessors requires intimate knowledge of the microarchitecture as well as an awareness of the ever-growing complexity in thread and cache topology. LIKWID is a set of command line utilities that addresses four key problems: Probing the thread and cache topology of a shared-memory node, enforcing thread-core affinity on a program, measuring performance...

2008
Martin Leucker Helmut Seidl

2014
Hadi Soleimany

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Hadi Soleimany Name of the doctoral dissertation Studies in Lightweight Cryptography Publisher School of Science Unit Department of Information and Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 211/2014 Field of research Theoretical Computer Science Manuscript submitted 26 September 2014 Da...

2011
Amir Herzberg

We present LOT, a lightweight ‘plug and play’ secure tunneling protocol deployed at network gateways. Two communicating gateways, A and B, running LOT would automatically detect each other and establish an efficient tunnel, securing communication between them. LOT tunnels allow A to discard spoofed packets that specify source addresses in B’s network and vice-versa. This helps to mitigate many ...

2005
Ben Adida Susan Hohenberger Ronald L. Rivest

Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key generation, certification, and distribution have not been pragmatically addressed. We recently proposed a method for implementing a Lightweight Public Key Infrastructure (PKI) for email authentication using recent developments in identitybased cryptography and today’s e...

2014
Kazuhiko Minematsu Jian Guo Sumio Morioka

2014
Christopher Clough Eric Christopher Clough

Large-displacement Lightweight Armor Randomly entangled fibers forming loosely bound nonwoven structures are evaluated for use in lightweight armor applications. These materials sacrifice volumetric efficiency in order to realize a reduction in mass versus traditional armor materials, while maintaining equivalent ballistic performance. The primary material characterized, polyester fiberfill, is...

2012
Lukas Rytz Martin Odersky Philipp Haller

Type-and-effect systems are a well-studied approach for reasoning about the computational behavior of programs. Nevertheless, there is only one example of an effect system that has been adopted in a wide-spread industrial language: Java’s checked exceptions. We believe that the main obstacle to using effect systems in day-to-day programming is their verbosity, especially when writing functions ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید