• No results found

bit-wise

A  Rate-Optimizing  Compiler  for  Non-malleable  Codes  Against  Bit-wise  Tampering   and  Permutations

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations

... Cramer et al. [CDF + 08] introduced the notion of arithmetic manipulation detection (AMD) codes, which is a special case of non-malleable codes against tampering functions with a simple algebraic structure; explicit AMD ...

23

The Effects of Constant and Bit Wise Neutrality on Problem Hardness, Fitness Distance Correlation and Phenotypic Mutation Rates

The Effects of Constant and Bit Wise Neutrality on Problem Hardness, Fitness Distance Correlation and Phenotypic Mutation Rates

... Kimura’s neutral theory of evolution has inspired researchers from the evolutionary computation community to incorporate neutrality into Evolutionary Algorithms (EAs) in the hope that it can aid evolution. The effects of ...

45

An Approach to Block Based Ciphering Using Bit Wise Calculation for Representation of A Number Using Its Corresponding Perfect Square Number and Position of Prime Number

An Approach to Block Based Ciphering Using Bit Wise Calculation for Representation of A Number Using Its Corresponding Perfect Square Number and Position of Prime Number

... STEP 1: At first from the 3rd line of the key we will fetch information about the dummy bits that are appended at the beginning of the encrypted bit stream. After fetching this information we will first discard ...

8

Non-Malleable  Coding  Against  Bit-wise   and  Split-State  Tampering

Non-Malleable Coding Against Bit-wise and Split-State Tampering

... The definition of non-malleable codes captures the requirement that if some adversary (with full knowl- edge of the code) tampers the codeword Enc(s) encoding a message s, corrupting it to f (Enc(s)), he cannot control ...

41

On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

... Since the context of this article is about ultra- lightweight protocols, we describe and analyze some of the current presented protocols of this category. One of the first and famous ultra-lightweight pro- tocols is SASI ...

9

Overview Of  Image Steganography And  Techniques

Overview Of Image Steganography And Techniques

... Image steganography techniques can be divided into two groups: those in the Image Domain and those in the Transform Domain Image – also known as spatial – domain techniques embed messages in the intensity of the pixels ...

5

From  Single-Bit  to  Multi-Bit  Public-Key  Encryption  via  Non-Malleable  Codes

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes

... In this section we examine the question of domain extension for CCA-secure public-key encryption (PKE) via the following intuitive non-malleable code based approach: first encode a k-bit message using a ...

37

Compact  Implementations  of  LEA  Block  Cipher  for  Low-End  Microprocessors

Compact Implementations of LEA Block Cipher for Low-End Microprocessors

... Previous 8-bit microprocessor results show that LEA is estimated to run at around 3,040 cycles for encryption on AVR AT90USB82/162 where AES best record is 1,993 cycles [7, 6]. Former implementation used separated ...

13

A Multilayer High Speed Magnetic Tunnel Junction Magneto resistive RAM Structure with Read Disturb Detection Circuit by Using Nano Electronics Quantum Dot Cellular Method

A Multilayer High Speed Magnetic Tunnel Junction Magneto resistive RAM Structure with Read Disturb Detection Circuit by Using Nano Electronics Quantum Dot Cellular Method

... by applying QCA technology compare to CMOS technology [1]. A portable high speed reversible memory formation with less heat dissipation and occupied area is introduced in this paper.Reversible Devices should be logically ...

7

Ultra Encryption Algorithm (UEA): Bit level Symmetric key Cryptosystem with randomized bits and feedback mechanism

Ultra Encryption Algorithm (UEA): Bit level Symmetric key Cryptosystem with randomized bits and feedback mechanism

... The present paper proposes a new cryptographic algorithm called Ultra Encryption Algorithm (UEA). Nath et al recently developed few efficient encryption methods such as UES version-I, Modified UES-I, UES version-II, ...

7

An Hyper-Elliptic Curve Cryptosystem Scheme Using 3bc Algorithm

An Hyper-Elliptic Curve Cryptosystem Scheme Using 3bc Algorithm

... Note that the process of byte-exchange hides the meaning of 56 byte data, and the exchange of the data block number hides the order of data block, which needs to be assembled later on. In addition, the ...

7

Secure  Binary  Field  Multiplication

Secure Binary Field Multiplication

... of LUT (T ). In Step 6, the LUT variables are added to intermediate results (C). Same procedures are conducted again for lower 4-bit of (A). In Figure 4, the power traces of Lopez et al. with degree 4 are ...

12

Hardware Modeling of Sorting Mechanism for Finding First Maxima

Hardware Modeling of Sorting Mechanism for Finding First Maxima

... applications, the most popular bit wise operations operates on one or more bit patterns or binary numerals at the level of their entity bits. It is a fast, primitive action directly supported by the ...

6

Implementation and Comparison of Vedic Multiplier using Area Efficient CSLA Architectures

Implementation and Comparison of Vedic Multiplier using Area Efficient CSLA Architectures

... CSLA is used in many computational systems to relieve the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum [1]. However, the CSLA is not area ...

8

DTC 10 1 S 100 SASI DMA Adapter Preliminary Specification Apr81 pdf

DTC 10 1 S 100 SASI DMA Adapter Preliminary Specification Apr81 pdf

... Control signal requesting input data Address bit" Address b1 t 1 Address bit 2 Address bit € Address bit 7 Address bit 8 ~.ddress bi t 13 Address bit 14 Address bit 11 Data out bit 2, ti[r] ...

31

310 103000 00 Modcomp III Computer Reference Manual May72 pdf

310 103000 00 Modcomp III Computer Reference Manual May72 pdf

... Load Bit in Register Load Bit in" Register and Branch Unconditionally Add Bit in Memory Add Bit in Memory and Branch if Nonzero Add Bit in Memory Short Displaced Add Bit in Memory Short [r] ...

157

3350 6650 15450 OEM Manual Jan84 pdf

3350 6650 15450 OEM Manual Jan84 pdf

... Unit Select Tag Unit Select 20 Unit Select 21 Unit Select 22 Unit Select 23 Tag 1 Tag 2 Tag 3 Bit 0 Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8 Bit 9 Open Cable Detector Index Sector[r] ...

60

High-speed  Curve25519  on 8-bit, 16-bit,   and 32-bit  microcontrollers

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers

... Abstract This paper presents new speed records for 128 -bit secure elliptic-curve Die-Hellman key-exchange software on three dierent popular microcontroller architectures. We consider a 255-bit curve ...

18

Topic wise, Sentiment wise, or Otherwise? Identifying the Hidden Dimension for Unsupervised Text Classification

Topic wise, Sentiment wise, or Otherwise? Identifying the Hidden Dimension for Unsupervised Text Classification

... In comparison to existing user feedback mech- anisms for assisting a clustering algorithm, ours requires comparatively little human intervention: we only require that the user select a d[r] ...

10

Multiple modes of Lrp4 function in modulation of Wnt/β catenin signaling during tooth development

Multiple modes of Lrp4 function in modulation of Wnt/β catenin signaling during tooth development

... to Wise-independent roles for Lrp4 in certain ...of Wise, and Lrp6ECD more responsive to co-expression of Wnt ...to Wise and a lower affinity to Wnt ...both Wise- dependent and -independent ...

13

Show all 4423 documents...

Related subjects