-
1
-
-
33646587847
-
Which has greater potential power impact: High-level design and algorithms or innovative low power technology
-
S. Kiaei and S. Devadas, "Which Has Greater Potential Power Impact: High-level Design and Algorithms or Innovative Low Power Technology," in Proc. 1996 International Symposium on Low Power Electronics and Design, 1996, pp. 175.
-
(1996)
Proc. 1996 International Symposium on Low Power Electronics and Design
, pp. 175
-
-
Kiaei, S.1
Devadas, S.2
-
2
-
-
0028722375
-
Power analysis of embedded software: A first step towards software power minimization
-
V. Tiwari, S. Malik, and A. Wolfe, "Power Analysis of Embedded Software: A First Step Towards Software Power Minimization," IEEE Transactions on Very Large Scale Integration Systems, vol. 4, no. 2, pp. 437-445, 1994.
-
(1994)
IEEE Transactions on Very Large Scale Integration Systems
, vol.4
, Issue.2
, pp. 437-445
-
-
Tiwari, V.1
Malik, S.2
Wolfe, A.3
-
5
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
P. Ganesan, R. Venugopalan, P. Peddabachagari, A, Dean. F. Mueller, and M. Sichitiu, "Analyzing and Modeling Encryption Overhead for Sensor Network Nodes," in Proc. 2nd ACM International Conference on Wireless Sensor Networks and Applications, 2003, pp. 151-159.
-
(2003)
Proc. 2nd ACM International Conference on Wireless Sensor Networks and Applications
, pp. 151-159
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
6
-
-
84867841362
-
Performance comparison: Security design choices - Building distributed applications with .NET
-
P. Dhawan, "Performance Comparison: Security Design Choices - Building Distributed Applications with .NET," Microsoft Developer Network. 2002. Available at http://msdn.microsoft.com/library/default.asp?url=/library/ en-us/dnbda/html/bdadotnetarch15.asp.
-
(2002)
Microsoft Developer Network
-
-
Dhawan, P.1
-
8
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
D. S. Wong, H. H. Fuentes, and A. Chan, "The Performance Measurement of Cryptographic Primitives on Palm Devices," in Proc. 17th Annual Computer Security Applications Conference, 2001, pp. 92-101.
-
(2001)
Proc. 17th Annual Computer Security Applications Conference
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.3
-
9
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "Analyzing the Energy Consumption of Security Protocols," in Proc. International Symposium on Low Power Electronics and Design, 2003. pp. 30-35.
-
(2003)
Proc. International Symposium on Low Power Electronics and Design
, pp. 30-35
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
10
-
-
33646580560
-
-
"SSE 3.0 Specification," Available at http://wp.netscape.com/ eng/ss13/.
-
SSE 3.0 Specification
-
-
-
12
-
-
0003286492
-
The TLS protocol version 1.0
-
T. Dierks and C. Allen, "The TLS Protocol Version 1.0," IETF RFC 2246, 1999.
-
(1999)
IETF RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
13
-
-
84944878354
-
-
Boca Raton, FL, CRC Press
-
A. J. Menezes, P. C. v. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 5th ed., Boca Raton, FL, CRC Press, 2001.
-
(2001)
Handbook of Applied Cryptography, 5th Ed.
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
14
-
-
33646573185
-
A description of the RC2(r) encryption algorithm
-
R. Rivest, "A Description of the RC2(r) Encryption Algorithm," IETF RFC 2268, 1998.
-
(1998)
IETF RFC
, vol.2268
-
-
Rivest, R.1
-
15
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," in Proc. Fast Software Encryption, Cambridge Security Workshop, 1993, pp. 191-204.
-
(1993)
Proc. Fast Software Encryption, Cambridge Security Workshop
, pp. 191-204
-
-
Schneier, B.1
-
16
-
-
27544489993
-
TEA, a tiny encryption algorithm
-
R. Needham and D. Wheeler, "TEA, a Tiny Encryption Algorithm," in Proc. Fast Software Encryption, Cambridge Security Workshop, 1994. pp. 363-366.
-
(1994)
Proc. Fast Software Encryption, Cambridge Security Workshop
, pp. 363-366
-
-
Needham, R.1
Wheeler, D.2
-
17
-
-
0006540774
-
Related-key cryptanalysis of 3-WAY. Biham-DES, CAST, DES-X NewDES. RC2, and TEA
-
J. Kelsey, B. Schneier, and D. Wagner, "Related-key cryptanalysis of 3-WAY. Biham-DES, CAST, DES-X NewDES. RC2, and TEA," Lecture Notes in Computer Science, 1334, 1997, pp. 233-246.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
18
-
-
15744395962
-
Tea extensions
-
Computer Laboratory, University of Cambridge
-
R. Needham and D. Wheeler, "Tea Extensions," Technical Report, Computer Laboratory, University of Cambridge, 1997. Available at http://www.cl.cam.ac.uk/ftp/users/djw3/xtea.ps.
-
(1997)
Technical Report
-
-
Needham, R.1
Wheeler, D.2
-
19
-
-
0003508558
-
Advanced Encryption Standard (AES)
-
National Institute of Standards and Technology, U.S. Department of Commerce, "Advanced Encryption Standard (AES)," FIPS PUB 197, 2001. Available at http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
(2001)
FIPS PUB
, vol.197
-
-
-
22
-
-
33646567956
-
-
M. Hahn, "Blowfish.NET 1.01," 2004. Available at http://www.hotpixel.net/bfnet101.zip.
-
(2004)
Blowfish.NET 1.01
-
-
Hahn, M.1
-
25
-
-
33646588158
-
How to: Time managed code using queryPerformanceCounter and QueryPerformanceFrequency
-
J. D. Meier, S. Vasireddy, A. Babbar, and A. Mackman, "How To: Time Managed Code Using QueryPerformanceCounter and QueryPerformanceFrequency," Microsoft Developer Network, 2004. Available at http://msdn.microsoft.com/ library/default.asp?url=/library/enus/dnpag/html/scalenethowto09.asp.
-
(2004)
Microsoft Developer Network
-
-
Meier, J.D.1
Vasireddy, S.2
Babbar, A.3
Mackman, A.4
|