[PDF] Top 20 Hardware architecture for pairing-based cryptography
Has 10000 "Hardware architecture for pairing-based cryptography" found on our website. Below are the top 20 most common "Hardware architecture for pairing-based cryptography".
Hardware architecture for pairing-based cryptography
... proposed architecture, which is expected because custom im- plementations make use of parallelization and other techniques in order to achieve faster ...more hardware resources, which is also evident in ... See full document
117
Ultra Fast Data Mining Hardware Architecture Based on Stochastic Computing
... useful for those applications requiring parallel-processing tech- niques [11 – ...the hardware used to solve each task is reduced in size if compared to tra- ditional digital ... See full document
20
Architecture based on open source hardware and software for designing a real time vehicle tracking device
... de hardware e software livre que permite o rastreamento de veículos em tem- po real apropriado às condições do país, um produto com maior funcionalidade do que o aplicado até ...de hardware e software ... See full document
13
Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard
... proposed architecture supports AES-CCM protocol, which is constituted from AESCCM module and data formatting ...iterative architecture with low hardware resources uti- lization, obtaining an AESCCMP ... See full document
13
Algorithm and hardware architecture for the discovery of frequent sequences
... Mining patterns from a data stream is a task needed in emerging applications, such as network traffic monitoring and web click streams analysis (Jiang and Gruenwald, 2006). The very high speed and the huge amount of data ... See full document
71
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
... required for developing security solutions that protect network ...curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic ... See full document
18
SETH: A Hierarchical, Agent based Architecture for Smart Spaces
... Similar assumptions cannot be taken regarding the security of other devices in the smart space. We cannot guarantee the physical security of switches, light bulbs or temperature sensors as we can guarantee that of the ... See full document
56
PC Based Open Control Architecture for Mechatronic Systems
... el hardware (adquisición y envío de señales) por lo que además de necesitar un programa de la aplicación en Simulink, se requiere pasar dicho programa en la interfaz de usuario propia de la empresa dSpace (dSPACE ... See full document
8
Monocular-SLAM dense mapping algorithm and hardware architecture for FPGA acceleration
... available for this purpose (odometers, gy- rometers, laser rangefinders, cameras, sonars, ...solutions based on: EKF (Extended Kalman filter), graph optimization and visual features are available in the ... See full document
174
FPGA-Based Wireless Sensor Node Architecture for High Performance Applications
... of hardware-based solutions had been avoided by the majority of WSN designers, new approaches are being opened to this kind of devices due to their much higher powerful processing ...novel ... See full document
124
A cloud based architecture for remote access to digital fabrication services for education
... Surprisingly, all the research efforts put to date in the digital fabrication area have been aimed at demonstrating the effectiveness of Fab Labs in education [5] and at incorporating digital fabrication in the curricula ... See full document
8
On the implementation of a hardware architecture for an audio data hiding system
... QIM based method, such as Dither Modulation, is the design of suitable quantizers used to embed the ...QIM based methods, presents lack of robustness against the gain attack, consisting in the ... See full document
12
A versatile hardware architecture for a constant false alarm rate processor based on a linear insertion sorter
... If the fixed threshold level is set properly, the receiver output would not exceed the threshold if only noise is present, but the receiver output would exceed this threshold if along with noise, a target is present. If ... See full document
15
Hardware architecture for adaptive filtering based on energy-CFAR processor for radar target detection
... complement for the CFAR algorithm is presented, a time frequency analysis of radar ...custom architecture that calculates the filter coefficients according changes in the ... See full document
6
Discrete logarithms in small characteristic finite fields: attacking Type 1 pairing-based cryptography
... estimates for the number of branches in a descent step, we assume that each distinct irreducible polynomial obtained has degree exactly m, whereas in practice many of these polynomials will have degree ... See full document
143
Image authentication scheme and its hardware architecture using watermarking and visual cryptography
... solution for video authentication and tamper ...method for ownership verification applications. The method is useful for MPEG-4 compression that inserts the logo in a video ...The hardware ... See full document
113
System architecture for trust-based news recommenders on the web
... content- based and collaborative filtering. Content-based recommenders [10] are driven by the premise that user’s preferences tend to persist through ...systems based on collaborative filtering [12] ... See full document
10
Sanla, A , & Numnonda, T (2019, July) A Comparative Performance of Real time Big Data Analytic Architectures In 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC) (pp 1 5) IEEE
... Lambda architecture has high accuracy and fast command ...maintenance for each layer, which is ...Kappa architecture does not include the batch layer in the architecture, presumably that many ... See full document
5
Dynamic Coordination in Fleet Management Systems: Toward Smart Cyber Fleets
... available for creation, verification, and implementation of route plans is of minor ...available for verification, correction and implementation of changed route plans is scarce [8, ... See full document
10
A Simulative Comparison of BB84 Protocol with its Improved Version
... Quantum cryptography offers a new solution to the key distribution ...is based on principles of quantum mechanics. BB84 is a protocol for key distribution using these principles, but with the ... See full document
5
Related subjects