Arithmetic shift

Results: 38



#Item
11Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-17 09:30:36
12IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST[removed]TABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUST[removed]TABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
13Cryptanalysis of the Knapsack Generator

Cryptanalysis of the Knapsack Generator

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-02-14 15:21:20
14Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Fast Correlation Attacks: an Algorithmic Point of View Philippe Chose, Antoine Joux, and Michel Mitton DCSSI, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux cedex, France [removed], Antoine.Joux@m4x.o

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
15Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Analysis of the Bit-Search Generator and sequence compression techniques⋆ Aline Gouget1 , Herv´e Sibert1 , Cˆome Berbain2 , Nicolas Courtois3 , Blandine Debraize3,4 , and Chris Mitchell5 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
16Manual to use the simulator for computer organization and architecture Developed by the Department of CSE, IIT kharagpur

Manual to use the simulator for computer organization and architecture Developed by the Department of CSE, IIT kharagpur

Add to Reading List

Source URL: virtual-labs.ac.in

Language: English - Date: 2013-01-04 07:49:22
17Microsoft PowerPoint - Pablo Martinez

Microsoft PowerPoint - Pablo Martinez

Add to Reading List

Source URL: www.nmspacegrant.com

Language: English - Date: 2011-04-27 15:21:08
181   Bitwise Operators  BitSet class

1  Bitwise Operators  BitSet class

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2011-04-25 16:03:59
19TUGboat, Volume[removed]), No. 1 to show off. And reader contributions for this column are still welcome! o Victor Eijkhout Department of Computer Science University of Tennessee at

TUGboat, Volume[removed]), No. 1 to show off. And reader contributions for this column are still welcome! o Victor Eijkhout Department of Computer Science University of Tennessee at

Add to Reading List

Source URL: tug.org

Language: English - Date: 2011-10-16 21:01:40
201  New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong

1 New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis Hayssam El-Razouk, Arash Reyhani-Masoleh, and Guang Gong

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:50:57