Library Catalogue
E-Books
E-Databases
E-Databases (Password Protected)
Teacher Resources
Reference Desk
Online Resources
Magazine/Journals
Media Center
Holy Quran
New Books List
 
 
IEEE Transactions on Computers—November 2008 (Vol. 57, No. 11)  

Table Of Contents

Front Covers

Cover1

Cover2

SPECIAL SECTION on Special-Purpose Hardware for Cryptography and Cryptanalysis

Guest Editors' Introduction to the Special Section on Special-Purpose Hardware for Cryptography and Cryptanalysis
Rainer Steinwandt, Willi Geiselmann, Çetin Kaya Koç

High-Performance Architecture of Elliptic Curve Scalar Multiplication
Bijan Ansari, M. Anwar Hasan

Algorithms and Arithmetic Operators for Computing the \eta_{T} Pairing in Characteristic Three
Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi

Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation
Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., Wai Fong (Andy) Chan, Zhun Huang

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
Sylvain Guilley, Laurent Sauvage, Philippe Hoogvorst, Renaud Pacalet, Guido Marco Bertoni, Sumanta Chaudhuri

Cryptanalysis with COPACOBANA
Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp

Elliptic-Curve-Based Security Processor for RFID
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede

Double-Data-Rate Computation as a Countermeasure against Fault Analysis
Paolo Maistri, Régis Leveugle

Protection Circuit against Differential Power Analysis Attacks for Smart Cards
Radu Muresan, Stefano Gregori

Regular Papers

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation
Michael E. Kounavis, Frank L. Berry

Efficient Approximate Wordlength Optimization
Paul D. Fiore

Configurable Flash-Memory Management: Performance versus Overheads
Jen-Wei Hsieh, Yi-Lin Tsai, Tei-Wei Kuo, Tzao-Lin Lee

Ads

Build Your Career in Computing

Back Covers

Cover3
Cover4