Results 61 to 70 of about 343 (81)

Bijdrage Tot ed Kennis Der Noord- En Oostkusten Van Nieuw Guinea, [PDF]

open access: yes
v. ; 27 cm.Publication suspended Mar.
De Bruijn Kops, G.F. , Luit. ter see 2de kl.
core  

Struktur Bahasa Jamee [PDF]

open access: yes, 1991
Bustami, Usman   +3 more
core  

Vector Instruction Set Extensions for Efficient Computation of Keccak

open access: yesIEEE transactions on computers, 2017
Hemendra K. Rawat, P. Schaumont
semanticscholar   +1 more source

A new authenticated encryption technique for handling long ciphertexts in memory constrained devices

open access: yesInternational Journal of Applied Cryptography, 2017
Megha Agrawal, D. Chang, S. K. Sanadhya
semanticscholar   +1 more source

SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje

open access: closedProceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016
Recent processor architectures such as Intel Westmere (and later) and ARMv8 include instruction-level support for the Advanced Encryption Standard (AES), for the Secure Hashing Standard (SHA-1, SHA2) and for carry-less multiplication. These crypto-instruction sets provide specialized hardware processing at the top of the memory hierarchy, and provide ...
Hemendra K. Rawat, Patrick Schaumont
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy