• Nenhum resultado encontrado

[PDF] Top 20 AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

Has 10000 "AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES " found on our website. Below are the top 20 most common "AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES ".

AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

AES ALGORITHM IMPLEMENTATION IN PROGRAMMING LANGUAGES

... ia AES standardizeaz ă dimensiunile de 128, 192 si 256 de bi i pentru lungimea cheii, dar restric ioneaz ă lungimea blocului la 128 de bi ...iile AES sunt definite sub form ă de opera ii pe matrice, unde ... See full document

9

Comparing General-Purpose and Domain-Specific Languages: An Empirical Study

Comparing General-Purpose and Domain-Specific Languages: An Empirical Study

... degree in “Mathematics and Computer Science”, at University of Minho (UM), and now she is a ...group” in 2005. She is teaching assistant in different courses in the area of Compilers and ... See full document

18

A primal-dual exterior point algorithm for linear programming problems

A primal-dual exterior point algorithm for linear programming problems

... In this Section, we will briefly discuss some important characteristics of this implementation. Programming a linear optimization algorithm differs much more from its simple pseudo-code ... See full document

10

Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)

Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)

... Rijndael algorithm, Advanced Encryption Standard (AES) in Hardware Description Language, ...Verilog. In this work we analyze the structure and design of new AES, following three ... See full document

5

Design and Implementation of a Behaviorally Typed Programming System for Web Services

Design and Implementation of a Behaviorally Typed Programming System for Web Services

... system in a Java like scripting language for Web Services. In- stead of focusing in the efficiency of the code, scripting languages have become a relevant programming concept for ... See full document

173

J. Braz. Comp. Soc.  vol.8 número3

J. Braz. Comp. Soc. vol.8 número3

... that programming languages can be translated into recurrent (analog, rational weighted) neural ...nets. Implementation of programming languages in neural nets turns to be not ... See full document

13

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices

... Hardware-accelerated AES was more efficient than every other algorithm, achieving a very good encryption throughput of ...that AES has high memory requirements, so unless our device has very limited ... See full document

23

A Parallel Approach to Cosine Calculation Using OpenCL

A Parallel Approach to Cosine Calculation Using OpenCL

... functions in many areas of computer science, is generally calculated by CORDIC algorithmalgorithm which shows the best performances in sequentially executed ...parallelisation. ... See full document

6

FPGA Implementation of a Multi-Population PBIL Algorithm

FPGA Implementation of a Multi-Population PBIL Algorithm

... solutions in each ...is, in fact, im- plemented sequentially in the major part of the com- puter ...Hence, in fact, when the popula- tion converges the algorithm has the task to ... See full document

8

Computer Algebra in Modern Functional Languages

Computer Algebra in Modern Functional Languages

... formulas in a pure functional language has been ...for programming languages is still dominated by the imperative languages, there is nothing that forbides the use of declarative ... See full document

140

Efficient Hardware Design and Implementation of AES Cryptosystem

Efficient Hardware Design and Implementation of AES Cryptosystem

... Standard, in Sept 12 of 19997, the National Institute of Standard Technology (NIST) required proposals to what was called Advanced Encryption Standard ...Rijndael algorithm is the best in security, ... See full document

7

LOW POWER FAULT TOLERANT SBOX DESIGN FOR XTS-AES ENCRYPTION

LOW POWER FAULT TOLERANT SBOX DESIGN FOR XTS-AES ENCRYPTION

... reconfigurability in its architecture for its high speed applications and low power ...consumption. In general a cryptography algorithm proposed should provide greater resistance to attacks either ... See full document

8

Building Neural Net Software

Building Neural Net Software

... Abstract. In a recent paper [Neto et al. 97] we showed that programming languages can be translated on recurrent (analog, rational weighted) neural ...machine programming, where (integer) ... See full document

35

Computational Intelligence for Life Sciences

Computational Intelligence for Life Sciences

... [86]. In this context, mathematical models and computational methods represent valuable and integrative tools to experimental biology, thanks to their capability to simulate the emergent behavior of biological ... See full document

24

UNIT – I Chapter1: JAVA2 ENTERPRISE EDITION OVERVIEW The ABC of Programming Languages:

UNIT – I Chapter1: JAVA2 ENTERPRISE EDITION OVERVIEW The ABC of Programming Languages:

... independent programming language the same year the internet was commercialized five technologists at Sun Microsystems, ...for programming software that could be embedded into electronic devices regardless ... See full document

99

Study And Implementation Of LCS Algorithm For Web Mining

Study And Implementation Of LCS Algorithm For Web Mining

... highways in the information World, the content providers are the road workers, and the visitors are the ...As in the real world, there can be traffic jams, wrong signs, blind alleys, and so ... See full document

4

Financial planning working capital ventures using software «analyzer bdds» sold on the basis of selection of optimal bond portfolio

Financial planning working capital ventures using software «analyzer bdds» sold on the basis of selection of optimal bond portfolio

... organizations, in particular presented a software implementation of the algorithm analyzes the budget forecast working capital, identify and take advantage of temporarily free money using a model of ... See full document

2

An evaluation framework and comparative analysis of the widely used first programming languages.

An evaluation framework and comparative analysis of the widely used first programming languages.

... the languages, so there should be a different weighting ...position in overall scoring, but is not being considered among highly used FPLs as of now, as shown in Table ...shown in Table 23. ... See full document

25

SimSearch: A new variant of dynamic programming based on distance series for optimal and near-optimal similarity discovery in biological sequences

SimSearch: A new variant of dynamic programming based on distance series for optimal and near-optimal similarity discovery in biological sequences

... symbols. In order to evaluate the correlation degree, a scoring scheme is necessary to assess the similar regions and, on the other hand, penalize deviations (mismatches, substitutions and ...stored in a ... See full document

10

An Efficient Parallel Algorithm for Longest Common Subsequence Problem on GPUs

An Efficient Parallel Algorithm for Longest Common Subsequence Problem on GPUs

... problem in computational biology and finding the longest common subsequence (LCS) of multiple bi- ological sequences is an essential and effective tech- nique in sequence ...dynamic programming ... See full document

6

Show all 10000 documents...