Library Catalogue
E-Databases (Password Protected)
Teacher Resources
Reference Desk
Online Resources
Media Center
Holy Quran
New Books List
IEEE Transactions on Computers—November 2008 (Vol. 57, No. 11)  

Table Of Contents

Front Covers



SPECIAL SECTION on Special-Purpose Hardware for Cryptography and Cryptanalysis

Guest Editors' Introduction to the Special Section on Special-Purpose Hardware for Cryptography and Cryptanalysis
Rainer Steinwandt, Willi Geiselmann, Çetin Kaya Koç

High-Performance Architecture of Elliptic Curve Scalar Multiplication
Bijan Ansari, M. Anwar Hasan

Algorithms and Arithmetic Operators for Computing the \eta_{T} Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi

Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation
Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., Wai Fong (Andy) Chan, Zhun Huang

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
Sylvain Guilley, Laurent Sauvage, Philippe Hoogvorst, Renaud Pacalet, Guido Marco Bertoni, Sumanta Chaudhuri

Cryptanalysis with COPACOBANA
Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp

Elliptic-Curve-Based Security Processor for RFID
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede

Double-Data-Rate Computation as a Countermeasure against Fault Analysis
Paolo Maistri, Régis Leveugle

Protection Circuit against Differential Power Analysis Attacks for Smart Cards
Radu Muresan, Stefano Gregori

Regular Papers

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation
Michael E. Kounavis, Frank L. Berry

Efficient Approximate Wordlength Optimization
Paul D. Fiore

Configurable Flash-Memory Management: Performance versus Overheads
Jen-Wei Hsieh, Yi-Lin Tsai, Tei-Wei Kuo, Tzao-Lin Lee


Build Your Career in Computing

Back Covers