نتایج جستجو برای: 5 32 8

تعداد نتایج: 1725345  

Journal: :Experimental Dermatology 1992

Journal: :International Journal of Research in Engineering and Technology 2014

2008
Marcel Medwed Elisabeth Oswald

Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices. Within these scenarios, they have proven to be the most powerful attacks. This is not surprising because they assume the most powerful adversaries. In this article we investigate how template attacks can be applied to implementations of an asymmetric crypto...

Journal: :Koers - Bulletin for Christian Scholarship 1965

Journal: :IACR Cryptology ePrint Archive 2010
Mourad Gouicem

In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at...

2010
Dag Arne Osvik Joppe W. Bos Deian Stefan David Canright

This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR microcontrollers and 32-bit ARM microprocessors, while on the other side of the spectrum we consider the high-performing Cell broadband engine and NVIDIA graphics processing units (GPUs). Platform specific techniques ar...

Journal: :Nucleic acids research 1994
A A Purmal Y W Kow S S Wallace

Recent studies with 8-oxodeoxyguanosine triphosphate (8-oxodGTP) have suggested that incorporation of oxidized nucleotides from the precursor pool into DNA may have deleterious effects. Here we show that 5-hydroxydeoxycytosine triphosphate (5-OHdCTP) and 5-hydroxydeoxyuridine triphosphate (5-OHdUTP) are more efficient substrates than 8-oxodGTP for Escherichia coli DNA polymerase I Klenow fragme...

2004
Lewis Girod Jeremy Elson Alberto Cerpa Thanos Stathopoulos Nithya Ramanathan Deborah Estrin

Many Wireless Sensor Network (WSN) applications are composed of a mixture of deployed devices with varying capabilities, from extremely constrained 8-bit “Motes” to less resource-constrained 32-bit “Microservers”. EmStar is a software environment for developing and deploying complex WSN applications on networks of 32-bit embedded Microserver platforms, and integrating with networks of Motes. Em...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید