نتایج جستجو برای: 32 to 8
تعداد نتایج: 10781943 فیلتر نتایج به سال:
the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...
ABC is a synchronous stream cipher optimized for software applications. Its design offers large flexibility concerning key material usage and memory consumption. Here we present a version of ABC with a 128-bit key and a 128-bit IV, a 32-bit non-linear filter, flexible key expansion, flexible and fast IV setup procedures, and variable memory requirements. Corresponding author Partially supported...
Herpesvirus anguillae (HVA), also known as anguillid herpesvirus 1 (AngHV1), is one of the relevant viruses in wild and cultured anguillid eels. Here, the complete genome sequence of strain HVA980811, isolated in Chiayi, Taiwan, is reported. The genotype of the eel herpesviruses in Taiwan is supposed to be identical to the Japanese AngHV1.
Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices. Within these scenarios, they have proven to be the most powerful attacks. This is not surprising because they assume the most powerful adversaries. In this article we investigate how template attacks can be applied to implementations of an asymmetric crypto...
In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the performances of our implementations, we explain for each candidate the main differences between our 8-bit and 32-bit implementations. Then, we compare our results to those of two benchmarks published at...
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR microcontrollers and 32-bit ARM microprocessors, while on the other side of the spectrum we consider the high-performing Cell broadband engine and NVIDIA graphics processing units (GPUs). Platform specific techniques ar...
Many Wireless Sensor Network (WSN) applications are composed of a mixture of deployed devices with varying capabilities, from extremely constrained 8-bit “Motes” to less resource-constrained 32-bit “Microservers”. EmStar is a software environment for developing and deploying complex WSN applications on networks of 32-bit embedded Microserver platforms, and integrating with networks of Motes. Em...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید