نتایج جستجو برای: 32 to 8

تعداد نتایج: 10781943  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

2005
Vladimir Anashin Andrey Bogdanov Ilya Kizhvatov Sandeep Kumar

ABC is a synchronous stream cipher optimized for software applications. Its design offers large flexibility concerning key material usage and memory consumption. Here we present a version of ABC with a 128-bit key and a 128-bit IV, a 32-bit non-linear filter, flexible key expansion, flexible and fast IV setup procedures, and variable memory requirements. Corresponding author Partially supported...

2017
Chiu-Ming Wen Ping-Chung Liu Fan-Hua Nan

Herpesvirus anguillae (HVA), also known as anguillid herpesvirus 1 (AngHV1), is one of the relevant viruses in wild and cultured anguillid eels. Here, the complete genome sequence of strain HVA980811, isolated in Chiayi, Taiwan, is reported. The genotype of the eel herpesviruses in Taiwan is supposed to be identical to the Japanese AngHV1.

Journal: :International Journal of Research in Engineering and Technology 2014

2008
Marcel Medwed Elisabeth Oswald

Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices. Within these scenarios, they have proven to be the most powerful attacks. This is not surprising because they assume the most powerful adversaries. In this article we investigate how template attacks can be applied to implementations of an asymmetric crypto...

Journal: :Koers - Bulletin for Christian Scholarship 1965

Journal: :IACR Cryptology ePrint Archive 2010
Mourad Gouicem

In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at...

2010
Dag Arne Osvik Joppe W. Bos Deian Stefan David Canright

This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR microcontrollers and 32-bit ARM microprocessors, while on the other side of the spectrum we consider the high-performing Cell broadband engine and NVIDIA graphics processing units (GPUs). Platform specific techniques ar...

2004
Lewis Girod Jeremy Elson Alberto Cerpa Thanos Stathopoulos Nithya Ramanathan Deborah Estrin

Many Wireless Sensor Network (WSN) applications are composed of a mixture of deployed devices with varying capabilities, from extremely constrained 8-bit “Motes” to less resource-constrained 32-bit “Microservers”. EmStar is a software environment for developing and deploying complex WSN applications on networks of 32-bit embedded Microserver platforms, and integrating with networks of Motes. Em...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید