نتایج جستجو برای: t table implementation
تعداد نتایج: 1151118 فیلتر نتایج به سال:
, 4 b s t r a c t : In conventional techniques [4-61 the phase angle between two signals of same frequency is computed by converting the signals into two square waves and then measuring the time difference between the zero crossing points of the square waves. In some other techniques the phase is computed by measuring the time difference between the pulse centers of the two square waves [l-31. ...
In this paper we evaluate and improve different vector implementation techniques of AES-based designs. We analyze how well the T-table, bitsliced and bytesliced implementation techniques apply to the SHA-3 finalist Grøstl. We present a number of new Grøstl implementations which improve upon many previous results. For example, our fastest ARM NEON implementation of Grøstl is 40% faster than the ...
this article discuss about public policy implementation for cultural space in iran. we want to design a model for implementing cultural policy. and will explain the factors of the model and the relations between them. then we will compare the proposed model with the other famous models on the word. the proposed model created with the qualitative methodology which is grounded theory (gt). with p...
Linear Hashing has been proposed as a simple and eecient technique for storing and retrieving key sets whose cardinality is not known in advance. Its main advantage is that it allows tables to grow and shrink gracefully without major reorganizations. In this paper, several modiications of the basic scheme are presented, together with performance measurements. It is also shown that the seemingly...
BACKGROUND Cardiovascular disease prevention is guided by so-called risk tables for calculating individual's risk numbers. However, they are not widely used in routine practice and it is important to understand the conditions for their use. OBJECTIVES Systematic review of the literature on professionals' performance regarding cardiovascular risk tables, in order to develop effective implement...
Abstract: Background:Blended learning is a term increasingly used to describe the way e-learning is being combined with traditional classroom methods and independent study to create a new, hybrid teaching methodology. The aim of this study was to explore the perspectives of Tabriz health center staff on the Establishment status of blended learning system based on ISO 10015 requirements. Methods...
Cache attacks are a special form of implementation attacks and focus on the exploitation of weaknesses in the implementation of a specific algorithm. We demonstrate an access-driven cache attack, which is based on the analysis of memory-access patterns due to the T-table accesses of the Advanced Encryption Standard (AES). Based on the work of Tromer et al. [20] we gather the cachememory access ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید