Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
99 | Johannes Jordan, Sabine Helwig, Rolf Wanka |
Social interaction in particle swarm optimization, the ranked FIPS, and adaptive multi-swarms. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
subswarms, performance analysis, particle swarm optimization, social interaction, adaptive optimization |
69 | Marco Antonio Montes de Oca, Thomas Stützle |
Convergence behavior of the fully informed particle swarm optimization algorithm. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
particle swarm optimization, experiments, swarm intelligence |
69 | Yong Lee 0003, Jianyu Lou, Junzhou Luo, Xiaojun Shen 0002 |
An efficient packet scheduling algorithm with deadline guarantees for input-queued switches. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
quality of service, real time scheduling, network flow, packet scheduling, input-queued switch |
69 | Aida Kamisalic, David Riaño 0001, Francis Real, Tatjana Welzer |
Temporal Constraints Approximation from Data about Medical Procedures. |
CBMS |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Baowen Xu |
PIDL / Pascal: A Pascal-oriented Program Interface Description Language And Its Applications. |
ACM SIGPLAN Notices |
1993 |
DBLP DOI BibTeX RDF |
Pascal |
53 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
52 | Wang Yingsong, Chen Wei |
f8 Keystream Generator with SMS4 as Core Algorithm. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Michael J. Cuellar, Ephraim R. McLean, Roy D. Johnson |
The measurement of information system use: preliminary considerations. |
CPR |
2006 |
DBLP DOI BibTeX RDF |
functional interface point, system use, measurement, information systems |
35 | Arvind S. Mohais, Rui Mendes 0001, Christopher Ward, Christian Posthoff |
Neighborhood Re-structuring in Particle Swarm Optimization. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Johann Großschädl, Guy-Armand Kamendje |
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Eric Wehrli |
Parsing and Collocations. |
Natural Language Processing |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Miles E. Smid, Dennis K. Branstad |
Response to Comments of the NIST Proposed Digital Signature Standard. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
30 | Alex He, Dafu Lou, Eric She, Shangjie Guo, Hareesh Watson, Sibyl Weng, Maria Perepechaenko, Randy Kuang |
FIPS Compliant Quantum Secure Communication using Quantum Permutation Pad. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Giacomo Ortali, Ioannis G. Tollis |
Computing Weak Dominance Drawings with Minimum Number of Fips. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
30 | Darren Hurley-Smith, Constantinos Patsakis, Julio C. Hernandez-Castro |
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Mikhail G. Babenko, Andrei Tchernykh, Aziz Redvanov, Anvar Djurabaev |
Comparative analysis of the scalar point multiplication algorithms in the NIST FIPS 186 elliptic curve cryptography. |
ICCS-DE |
2021 |
DBLP BibTeX RDF |
|
30 | Tingting Zhang, Junru Zhu, Yang Liu, Fulong Chen 0002 |
The Novel Efficient Dual-field FIPS Modular Multiplication. |
KSII Trans. Internet Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Michael Wilson, Luke Strickland, Timothy Ballard |
FIPS: An R Package for Biomathematical Modelling of Human Fatigue Related Impairment. |
J. Open Source Softw. |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Matwey V. Kornilov, Konstantin L. Malanchev |
Fips: An OpenGL based FITS viewer. |
Astron. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay |
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. |
IEEE Trans. Computers |
2019 |
DBLP DOI BibTeX RDF |
|
30 | |
FIPS PUB 173. |
Encyclopedia of GIS |
2017 |
DBLP DOI BibTeX RDF |
|
30 | |
FIPS 173. |
Encyclopedia of GIS |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Luka Nerima, Vasiliki Foufi, Eric Wehrli |
Parsing and MWE Detection: Fips at the PARSEME Shared Task. |
MWE@EACL |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Yves Lhuillier, Jean-Marc Philippe, Alexandre Guerre, Michal Kierzynka, Ariel Oleksiak |
Parallel Architecture Benchmarking: From Embedded Computing to HPC, a FiPS Project Perspective. |
EUC |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Quynh Dang |
Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard. |
Cryptologia |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Tom Caddy |
FIPS 140-2. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Abdul Ghafoor Abbasi, Sead Muftic, Shahzad Mumtaz |
Security extensions of Windows environment based on FIPS 201 (PIV) smart card. |
WorldCIS |
2011 |
DBLP BibTeX RDF |
|
30 | Violeta Seretan, Eric Wehrli, Luka Nerima, Gabriela Soare |
FipsRomanian: Towards a Romanian Version of the Fips Syntactic Parser. |
LREC |
2010 |
DBLP BibTeX RDF |
|
30 | |
FIPS 173. |
Encyclopedia of GIS |
2008 |
DBLP DOI BibTeX RDF |
|
30 | |
FIPS PUB 173. |
Encyclopedia of GIS |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Tom Caddy |
FIPS 140-2. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Jacek Passia, Klaus-Peter Löhr |
Fips: A Functional-Imperative Language for Explorative Programming. |
ACM SIGPLAN Notices |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Takeshi Yamakawa |
High-speed fuzzy controller hardware system: The mega-FIPS machine. |
Inf. Sci. |
1988 |
DBLP DOI BibTeX RDF |
|
30 | Hubert Mäncher |
Synchronization tools and a restart method in the fault-tolerant distributed automation system FIPS. |
Fehlertolerierende Rechensysteme |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Ross S. Purves |
Answering geographic questions with user generated content: experiences from the coal face. |
SCG |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sumeet Bajaj, Radu Sion |
TrustedDB: a trusted hardware based database with privacy and data confidentiality. |
SIGMOD Conference |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Sarah Spiekermann, Lorrie Faith Cranor |
Engineering Privacy. |
IEEE Trans. Software Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Alissa Cooper, John B. Morris |
Binding privacy rules to location on the web. |
LocWeb |
2009 |
DBLP DOI BibTeX RDF |
privacy, policy, location |
17 | O. Katz, D. A. Ramon, Israel A. Wagner |
A Robust Random Number Generator Based on a Differential Current-Mode Chaos. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ahmet Samil Demirkol, Serdar Özoguz, Vedat Tavas, Selçuk Kilinç |
A CMOS realization of double-scroll chaotic circuit and its application to random number generation. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Akashi Satoh |
ASIC hardware implementations for 512-bit hash function Whirlpool. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ihor Vasyltsov, Eduard Hambardzumyan, Young-Sik Kim, Bohdan Karpinskyy |
Fast Digital TRNG Based on Metastable Ring Oscillator. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Digital TRNG, Metastable Ring Oscillator, AIS.31, FPGA |
17 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
17 | Jorge Nakahara Jr., Ivan Carlos Pavão |
Impossible-Differential Attacks on Large-Block Rijndael. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
information security, Impossible differential cryptanalysis |
17 | Salih Ergün, Serdar Özoguz |
A Chaos-Modulated Dual Oscillator-Based Truly Random Number Generator. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Frederik Armknecht, Joao Girão, Marc Ph. Stoecklin, Dirk Westhoff |
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Paul A. Karger |
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
privacy, smart cards, personal identification |
17 | Hirotaka Yoshida, Alex Biryukov |
Analysis of a SHA-256 Variant. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256 |
17 | Salih Ergün, Serdar Özoguz |
A Truly Random Number Generator Based on a Continuous-Time Chaotic Oscillator for Applications in Cryptography. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yasuyuki Sakai, Kouichi Sakurai |
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction |
17 | Refik Sever, A. Neslin Ismailoglu, Yusuf Çagatay Tekmen, Murat Askar, Burak Okcan |
A High Speed FPGA Implementation of the Rijndael Algorithm. |
DSD |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Jesús Lázaro 0001, Armando Astarloa, Jagoba Arias, Unai Bidarte, Carlos Cuadrado |
High Throughput Serpent Encryption Implementation. |
FPL |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Marco Bucci, Lucia Germani, Raimondo Luzzi, Alessandro Trifiletti, Mario Varanonuovo |
A High-Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
noise source, jittered oscillator, Smart Cards, Random number generator |
17 | Shay Ping Seng, Wayne Luk, Peter Y. K. Cheung |
Run-Time Adaptive Flexible Instruction Processors. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Anand Desai, Alejandro Hevia, Yiqun Lisa Yin |
A Practice-Oriented Treatment of Pseudorandom Number Generators. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
17 | D. Craig Wilcox, Lyndon G. Pierson, Perry J. Robertson, Edward L. Witzke, Karl Gass |
A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Marc Joye, Sung-Ming Yen |
ID-based Secret-Key Cryptography. |
ACM SIGOPS Oper. Syst. Rev. |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Authentication Using Minimally Trusted Servers. |
ACM SIGOPS Oper. Syst. Rev. |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Ping Hu, Bruce Christianson |
Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms. |
ACM SIGOPS Oper. Syst. Rev. |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Marco Fiorello, John Cugini |
Is COBOL-8x cost effective? |
AFIPS National Computer Conference |
1984 |
DBLP DOI BibTeX RDF |
|
17 | George N. Baird, Margaret M. Cook |
Experiences in COBOL compiler validation. |
AFIPS National Computer Conference |
1974 |
DBLP DOI BibTeX RDF |
|