Academic literature on the topic 'Implementations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Implementations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Implementations"

1

Haycraft, Joshua. "Implementations." postmedieval: a journal of medieval cultural studies 7, no. 3 (October 2016): 388–92. http://dx.doi.org/10.1057/s41280-016-0006-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

K, Sucharitha, and Rahul Reddy P. "An Efficient Implementation of Multipliers for ASIC Implementations." International Journal of VLSI & Signal Processing 3, no. 1 (April 25, 2016): 1–4. http://dx.doi.org/10.14445/23942584/ijvsp-v3i1p101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

van Roggen, Walter. "Lisp implementations." ACM SIGPLAN Lisp Pointers 1, no. 3 (August 1987): 50–52. http://dx.doi.org/10.1145/1317203.1317214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

van Roggen, Walter. "Lisp implementations." ACM SIGPLAN Lisp Pointers 1, no. 1 (April 1987): 46–55. http://dx.doi.org/10.1145/1862396.1862404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abed, Sa’ed, Reem Jaffal, Bassam Mohd, and Mohammad Alshayeji. "FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher." Sensors 19, no. 4 (February 21, 2019): 913. http://dx.doi.org/10.3390/s19040913.

Full text
Abstract:
Security of sensitive data exchanged between devices is essential. Low-resource devices (LRDs), designed for constrained environments, are increasingly becoming ubiquitous. Lightweight block ciphers provide confidentiality for LRDs by balancing the required security with minimal resource overhead. SIMON is a lightweight block cipher targeted for hardware implementations. The objective of this research is to implement, optimize, and model SIMON cipher design for LRDs, with an emphasis on energy and power, which are critical metrics for LRDs. Various implementations use field-programmable gate array (FPGA) technology. Two types of design implementations are examined: scalar and pipelined. Results show that scalar implementations require 39% less resources and 45% less power consumption. The pipelined implementations demonstrate 12 times the throughput and consume 31% less energy. Moreover, the most energy-efficient and optimum design is a two-round pipelined implementation, which consumes 31% of the best scalar’s implementation energy. The scalar design that consumes the least energy is a four-round implementation. The scalar design that uses the least area and power is the one-round implementation. Balancing energy and area, the two-round pipelined implementation is optimal for a continuous stream of data. One-round and two-round scalar implementations are recommended for intermittent data applications.
APA, Harvard, Vancouver, ISO, and other styles
6

NEDJAH, NADIA, RODRIGO MARTINS DA SILVA, and LUIZA DE MACEDO MOURELLE. "ANALOG HARDWARE IMPLEMENTATIONS OF ARTIFICIAL NEURAL NETWORKS." Journal of Circuits, Systems and Computers 20, no. 03 (May 2011): 349–73. http://dx.doi.org/10.1142/s0218126611007347.

Full text
Abstract:
There are several possible implementations of artificial neural network that are based either on software or hardware systems. Software implementations are rather inefficient due to the fact that the intrinsic parallelism of the underlying computation is usually not taken advantage of in a mono-processor kind of computing system. Existing hardware implementations of ANNs are efficient as the dedicated datapath used is optimized and the hardware is usually parallel. Hardware implementations of ANNs may be either digital, analog, or even hybrid. Digital implementations of ANNs tend to be of high complexity, thus of high cost, and somehow imprecise due to the use of lookup table for the activation function. On the other hand, analog implementation of ANNs are generally very simple and much more precise. In this paper, we focus on possible analog implementations of ANNs. The neuron is based on a simple operational amplifier. The reviewed implementations allow for the use of both negative and positive synaptic weights. An alternative implementation permits the realization of the training process.
APA, Harvard, Vancouver, ISO, and other styles
7

Seo, Hwajeong, Hyunjun Kim, Kyungbae Jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Siwoo Uhm, and Hyunji Kim. "Secure HIGHT Implementation on ARM Processors." Mathematics 9, no. 9 (May 6, 2021): 1044. http://dx.doi.org/10.3390/math9091044.

Full text
Abstract:
Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for implementations of the HIGHT block cipher, which exploit different parallel approaches, including task parallelism and data parallelism methods, for high-speed and high-throughput implementations. For the efficient parallel implementation of the HIGHT block cipher, the SIMD instructions of ARM architecture are fully utilized. These instructions support four-way 8-bit operations in the parallel way. The length of primitive operations in the HIGHT block cipher is 8-bit-wise in addition–rotation–exclusive-or operations. In the 32-bit word architecture (i.e., the 32-bit ARM architecture), four 8-bit operations are executed at once with the four-way SIMD instruction. By exploiting the SIMD instruction, three parallel HIGHT implementations are presented, including task-parallel, data-parallel, and task/data-parallel implementations. In terms of the secure implementation, we present a fault injection countermeasure for 32-bit ARM microcontrollers. The implementation ensures the fault detection through the representation of intra-instruction redundancy for the data format. In particular, we proposed two fault detection implementations by using parallel implementations. The two-way task/data-parallel based implementation is secure against fault injection models, including chosen bit pair, random bit, and random byte. The alternative four-way data-parallel-based implementation ensures all security features of the aforementioned secure implementations. Moreover, the instruction skip model is also prevented. The implementation of the HIGHT block cipher is further improved by using the constant value of the counter mode of operation. In particular, the 32-bit nonce value is pre-computed and the intermediate result is directly utilized. Finally, the optimized implementation achieved faster execution timing and security features toward the fault attack than previous works.
APA, Harvard, Vancouver, ISO, and other styles
8

Weissbart, Léo, Łukasz Chmielewski, Stjepan Picek, and Lejla Batina. "Systematic Side-Channel Analysis of Curve25519 with Machine Learning." Journal of Hardware and Systems Security 4, no. 4 (October 16, 2020): 314–28. http://dx.doi.org/10.1007/s41635-020-00106-w.

Full text
Abstract:
AbstractProfiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning techniques to mount side-channel attacks on two implementations of scalar multiplication on the elliptic curve Curve25519. The first implementation follows the baseline implementation with complete formulae as used for EdDSA in WolfSSl, where we exploit power consumption as a side-channel. The second implementation features several countermeasures, and in this case, we analyze electromagnetic emanations to find side-channel leakage. Most techniques considered in this work result in potent attacks, and especially the method of choice appears to be convolutional neural networks (CNNs), which can break the first implementation with only a single measurement in the attack phase. The same convolutional neural network demonstrated excellent performance for attacking AES cipher implementations. Our results show that some common grounds can be established when using deep learning for profiling attacks on very different cryptographic algorithms and their corresponding implementations.
APA, Harvard, Vancouver, ISO, and other styles
9

MORALES-SANDOVAL, M., C. FEREGRINO-URIBE, R. CUMPLIDO, and I. ALGREDO-BADILLO. "A SINGLE FORMULA AND ITS IMPLEMENTATION IN FPGA FOR ELLIPTIC CURVE POINT ADDITION USING AFFINE REPRESENTATION." Journal of Circuits, Systems and Computers 19, no. 02 (April 2010): 425–33. http://dx.doi.org/10.1142/s0218126610006153.

Full text
Abstract:
A formula for point addition in elliptic curves using affine representation and its implementation in FPGA is presented. The use of this new formula in hardware implementations of scalar multiplications for elliptic curve cryptography has the main advantages of: (i) reducing area for the implementations of elliptic curve point addition, and (ii) increasing the resistance to side channel attacks of the hardware implementation itself. Hardware implementation of scalar multiplication for elliptic curve cryptography using this new formulation requires low area resources while keeping high performance compared to implementations using projective coordinates, which are usually considered faster than the affine coordinates.
APA, Harvard, Vancouver, ISO, and other styles
10

Shikfa, Abdullatif. "Garbled Circuits: Optimizations and Implementations." Information & Security: An International Journal 37 (2017): 11–27. http://dx.doi.org/10.11610/isij.3701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Implementations"

1

O'Rourke, Colleen Marie. "Efficient NTRU implementations." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0430102-111906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lembo, Domenico. "Dealing with Inconsistency and Incompleteness in Data Integration." Doctoral thesis, La Sapienza, 2004. http://hdl.handle.net/11573/917064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khasian, Nooshin, and Sara Goodarzian. "OBDD–based Set Implementations." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nemec, Matus <1992&gt. "Challenging RSA cryptosystem implementations." Doctoral thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/17849.

Full text
Abstract:
In questo lavoro di tesi abbiamo studiato le proprietà di sicurezza delle implementazioni del cifrario RSA. Nella prima parte, analizziamo i metodi per la generazioni di chiavi RSA di diverse librerie crittografiche. Mostriamo, in particolare, un'applicazione pratica basata su ‘bias’ nelle chiavi RSA che permette di misurare la popolarità delle varie librerie crittografiche e sviluppiamo un metodo di fattorizzazione che rompe un algoritmo proprietario di generazione di chiavi. Nella seconda parte, esaminiamo diversi problemi implementativi del protocollo TLS, come ad esempio i 'padding oracle' di RSA, nel contesto, più ampio, dell'ecosistema Web. Il nostro lavoro mostra come RSA, nonostante la sua apparente semplicità, richieda grande cautela per essere implementato correttamente. Diversamente da RSA, la crittografia basata su curve ellittiche (ECC) utilizza sequenze casuali come chiavi e non richiede padding, risultando, tra le altre cose, più resistente a errori di configurazione. La nostra raccomandazione, quindi, è che gli sviluppatori seguano l’esempio di TLS versione 1.3, in cui è cessato l’utilizzo di RSA in favore di ECC.
The aim of our research was to study security properties of real-world deployments of the RSA cryptosystem. First we analyze RSA key generation methods in cryptographic libraries. We show a practical application of biases in RSA keys for measuring popularity of cryptographic libraries and we develop a factorization method that breaks a proprietary key generation algorithm. Later we examine published implementation issues in the TLS protocol, such as RSA padding oracles, in the wider context of the Web ecosystem. Our work helps to demonstrate how RSA, a seemingly simple and intuitive cryptosystem, requires a lot of knowledge to be implemented correctly. Unlike RSA, elliptic curve cryptography (ECC) algorithms do not require padding, and parameters can be chosen such that random strings serve as keys. It is more resistant to bad user configurations and provides many other benefits. We conclude that practitioners should follow the example of TLS version 1.3 and stop using RSA in favor of ECC.
APA, Harvard, Vancouver, ISO, and other styles
5

Hiles, Charmelle Amanda. "Using experience from previous failed implementations to improve future lean implementation strategy." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/11047.

Full text
Abstract:
The main objective of the study was to ascertain the presence of the identified critical success factors for lean sustainability in a chemical manufacturing company in Port Elizabeth. The critical success factors that formed part of the research included leadership involvement and commitment, management involvement and commitment, employee engagement and organisational culture. The methodology used was one of a positivistic approach. A questionnaire was utilized and the responses were analyzed using various statistical methods. Based on the results from the analysis, recommendations and conclusions could be drawn. The inferential results of the study indicated that all the critical success factors identified for this study were present within the organisation. However, there were still a large percentage of respondents that remained neutral across all the questions which could indicate reasons why previous attempts in lean implementation failed. The recommendations provided were based on the findings of the study. An implementation strategy was identified and outlined. This strategy and recommendations will assist in providing a sound platform for a sustainable lean initiative within the organisation.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Xuan. "Verification of digital controller implementations /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1073.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hedenström, Felix. "Trial Division : Improvements and Implementations." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211090.

Full text
Abstract:
Trial division is possibly the simplest algorithm for factoring numbers.The problem with Trial division is that it is slow and wastes computationaltime on unnecessary tests of division. How can this simple algorithms besped up while still being serial? How does this algorithm behave whenparallelized? Can a superior serial and a parallel version be combined intoan even more powerful algorithm?To answer these questions the basics of trial divisions where researchedand improvements where suggested. These improvements where later im-plemented and tested by measuring the time it took to factorize a givennumber.A version using a list of primes and multiple threads turned out to bethe fastest for numbers larger than 10 10 , but was beaten when factoringlower numbers by its serial counterpart. A problem was detected thatcaused the parallel versions to have long allocation times which slowedthem down, but this did not hinder them much.
Trial division är en av de enklaste algoritmerna när det kommer till attfaktorisera tal. Problemet med trial division är att det är relativt långsamtoch att det gör onödiga beräkningar. Hur kan man göra denna algoritmsnabbare utan att inte göra den seriell? Hur beter sig algoritmen när denär parallelliserad? Kan en förbättrad seriell sedan bli parallelliserad?För att besvara dessa frågor studerades trial division och dess möjligaförbättringar. Dessa olika förbättringar implementerades i form av flerafunktioner som sedan och testades mot varandra.Den snabbaste versionen byggde på att använda en lista utav primtaloch trådar för att minimera antal ’trials’ samt att dela upp arbetet. Denvar dock inte alltid snabbast, då den seriella versionen som också användeen lista av primtal var snabbare för siffror under 10 10 . Sent upptäck-tes ett re-allokeringsproblem med de parallella implementationerna, meneftersom de ändå var snabbare fixades inte detta problemet.
APA, Harvard, Vancouver, ISO, and other styles
8

Valencia-Palomo, Guillermo. "Efficient implementations of predictive control." Thesis, University of Sheffield, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yanco, Holly A. (Holly Ann). "Robot communication : issues and implementations." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/37729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pinto, de Mendonça José Rogério 1963. "Business impacts of CRM implementations." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8467.

Full text
Abstract:
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management of Technology Program, 2002.
Includes bibliographical references (leaves 75-76).
This thesis aims at examining CRM implementations and at obtaining theoretical and practical evidence to three questions: ** What patterns emerge in successful CRM implementations, and general factors that prevent organizations from achieving expected results in such projects; ** What business benefits and impacts (e.g., return on investment, customer value, and redesign of business processes), are typically observed in CRM initiatives; ** How companies rearrange their organizational structures to, maximize the benefits of CRM. To accomplish these goals the author conducted a review of available literature, arid then interviewed members of 3 companies that implemented CRM and 2 system integrators with comprehensive experience in implementation of CRM. This practical experience intended to confirm the findings obtained through the literature review. The 3 companies researched are market leaders in the Financial Service Industry in Latin America. Consistently, the System Integrators interviewed actively serve the same industry. The major findings of this work are the following: ** Technology components as well as vendor selection is secondary as a key success factor; ** Companies usually do not reorganize themselves due to CRM implementations. Structure models; seems to be much more dependent on intrinsic cultural aspects; ** Observed business benefits have a high degree of variation, depending much on the situation before the implementation - all researched cases were considered to be successful. Although the sample analyzed is not sufficient to establish generalizations, due to its size and to the impossibility of obtaining reliable numeric or quantitative data, we report our results and interpret as a contribution to the growing body of evidence. Most of the conclusions are consistent with the literature review findings, with the exception of the observed absence of 'business cases' in the analyzed companies. The literature claims that elaboration of detailed business cases is critical, whereas in the analyzed companies a less rigorous, but nevertheless detailed, planning was sufficient to ensure success. Apart from the limitation of the size of the researched sample, due to the relative newness of the theme, part of the literature reviewed was composed by white papers published by CRM vendors, management consulting firms, and independent research and advisory companies. The research suggests that such implementations have important and lasting effects on the business. It also indicates that the magnitude of the business impacts are intrinsically dependent of the realities of particular companies, and cannot be generalized even within the specific financial services sector. Most of conclusions are based on qualitative analysis. since the number of cases, complexity and variability of the implementations, prevent from generating statically sound analysis. It would be valuable if this research could be extended through other industry sectors, in Latin America, or alternatively to encompass financial service companies from other regions.
by José Rogério Pinto de Mendonça.
S.M.M.O.T.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Implementations"

1

McBryan, Oliver A. Hypercube algorithms and implementations. New York: Courant Institute of Mathematical Sciences, New York University, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Gexiang, Mario J. Pérez-Jiménez, Agustín Riscos-Núñez, Sergey Verlan, Savas Konur, Thomas Hinze, and Marian Gheorghe. Membrane Computing Models: Implementations. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1566-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Péter, Kacsuk, and Wise Michael J. 1954-, eds. Implementations of distributed Prolog. Chichester: Wiley, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bowen, Jonathan. Specifying system implementations in Z. Oxford: OxfordUniversity Computing Laboratory, Programming Research Group, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eberhart, Russell C. Computational intelligence: Concepts to implementations. San Francisco: Morgan Kaufmann Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fanes-Casals, Jordi. Proving correctness of constructor implementations. Edinburgh: University of Edinburgh, Laboratory for Foundations of Computer Science, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tick, Evan. Implementations of Logic Programming Systems. Boston, MA: Springer US, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1959-, Tick Evan, Succi Giancarlo 1964-, and International Conference on Logic Programming (1993 : Budapest, Hungary), eds. Implementations of logic programming systems. Boston: Kluwer Academic Publishers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Farres-Casals, Jordi. Proving correctness of constructor implementations. Edinburgh: University of Edinburgh, Laboratory for Foundations of Computer Science, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Om V., ed. Bio-pigmentation and Biotechnological Implementations. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119166191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Implementations"

1

Wens, Mike, and Michiel Steyaert. "Implementations." In Design and Implementation of Fully-Integrated Inductive DC-DC Converters in Standard CMOS, 213–59. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-1436-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peluso, Vincenzo, Michiel Steyaert, and Willy Sansen. "Implementations." In Design of Low-Voltage Low-Power CMOS Delta-Sigma A/D Converters, 125–39. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4757-2978-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bergou, János A., Mark Hillery, and Mark Saffman. "Implementations." In Graduate Texts in Physics, 201–20. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75436-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Michel, René, Igor Schnakenburg, and Tobias von Martens. "Software Implementations." In Targeting Uplift, 147–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22625-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schneier, Bruce. "Example Implementations." In Applied Cryptography, Second Edition, 561–95. Indianapolis, Indiana: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119183471.ch24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Martin, Denis, and Martina Zitterbart. "Prototype Implementations." In Architecture and Design for the Future Internet, 245–77. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-90-481-9346-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Haj Baddar, Sherenaz W., and Kenneth E. Batcher. "Software Implementations." In Designing Sorting Networks, 9–12. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-1851-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mondal, Abdul Sakib. "Example Implementations." In Mobile IP, 109–40. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0051-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schlechtendahl, E. G. "Other implementations." In CAD Data Transfer for Solid Models, 210–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-83997-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Negre, Elsa. "Practical Implementations." In Information and Recommender Systems, 43–55. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119102779.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Implementations"

1

Li, Nuo, JeeHyun Hwang, and Tao Xie. "Multiple-implementation testing for XACML implementations." In the 2008 workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1390832.1390837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cruz, Rafael J., and Diego F. Aranha. "Efficient Software Implementations of Fantomas." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19309.

Full text
Abstract:
We present a series of software implementations of the Fantomas block cipher in resource-constrained ARM devices like the Cortex-M3 and Cortex-M4; and more powerful processors such as the ARM Cortex-A15 and modern Intel platforms. Our implementations span a broad range of characteristics: 32-bit and 64-bit versions, side-channel resistant and vectorized code for NEON and SSE instructions. Our implementations of the algorithm improve the state of the art substantially, both in terms of efficiency or compactness, by making use of novel algorithmic techniques and features specific to the target platform. In particular, our unprotected 32-bit implementation achieves speedups from 35% to 66% in the ARM Cortex-M architecture, while consuming considerably less code size. The vectorized implementations improve performance over the state of the art by 40% in the ARM Cortex-A15 and 50% in the Core i7 Ivy Bridge, setting new speed records for the implementation of the block cipher.
APA, Harvard, Vancouver, ISO, and other styles
3

Lambán, Laureano, Vico Pascual, and Julio Rubio. "Specifying implementations." In the 1999 international symposium. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/309831.309947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Molavi, Shawn, and Toby McPheeters. "Concurrent Test Implementations." In 16th Asian Test Symposium (ATS 2007). IEEE, 2007. http://dx.doi.org/10.1109/ats.2007.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Molavi, Shawn, and Toby McPheeters. "Concurrent Test Implementations." In 16th Asian Test Symposium (ATS 2007). IEEE, 2007. http://dx.doi.org/10.1109/ats.2007.4388014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Helmi, Maryam, Lisa Higham, and Philipp Woelfel. "Strongly linearizable implementations." In the 2012 ACM symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2332432.2332508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stouraitis, Thanos. "Cryptographic system implementations." In 2013 17th CSI International Symposium on Computer Architecture and Digital Systems (CADS). IEEE, 2013. http://dx.doi.org/10.1109/cads.2013.6714218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Klyne, S. "Validating connectionist implementations." In 4th International Conference on Artificial Neural Networks. IEE, 1995. http://dx.doi.org/10.1049/cp:19950559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hagersten, E., A. Saulsbury, and A. Landin. "Simple COMA node implementations." In Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences. IEEE Comput. Soc. Press, 1994. http://dx.doi.org/10.1109/hicss.1994.323136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"CONSTRUCTING EVOLVABLE ENTERPRISE IMPLEMENTATIONS." In Special Session on Software and Data Technologies. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0003047605210531.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Implementations"

1

Aboba, B., J. Lu, J. Alsop, J. Ding, and W. Wang. Review of Roaming Implementations. RFC Editor, September 1997. http://dx.doi.org/10.17487/rfc2194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moore, Shirley, Daniel Pressel, and Juan C. Chaves. Reality Check on OpenMP Implementations. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Apple, C., and K. Rossen. X.500 Implementations Catalog-96. RFC Editor, April 1997. http://dx.doi.org/10.17487/rfc2116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Roberts, Richard A. VLSI Implementations for Digital Signal Processing. Fort Belvoir, VA: Defense Technical Information Center, December 1987. http://dx.doi.org/10.21236/ada189612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mayr, E. W., and C. G. Plaxton. Network Implementations of the DTEP Algorithm,. Fort Belvoir, VA: Defense Technical Information Center, May 1987. http://dx.doi.org/10.21236/ada323773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gutierrez, Samuel Keith. A Memory Consumption Benchmark for MPI Implementations. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1482909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zorluoglu, Habib I., Fahrettin Tezcan, and Turker Cakir. Offset Implementations for Turkey's International Defense Acquisitions. Fort Belvoir, VA: Defense Technical Information Center, December 2008. http://dx.doi.org/10.21236/ada493913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kailath, Thomas. Studies in Estimation Theory, Applications and Implementations. Fort Belvoir, VA: Defense Technical Information Center, June 1989. http://dx.doi.org/10.21236/ada210712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lang, R., and R. Wright. A Catalog of Available X.500 Implementations. RFC Editor, January 1992. http://dx.doi.org/10.17487/rfc1292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Faynberg, I., J. Voelker, M. Weissman, W. Zhang, S. Rhim, J. Hwang, S. Ago, et al. Pre-Spirits Implementations of PSTN-initiated Services. Edited by H. Lu. RFC Editor, November 2000. http://dx.doi.org/10.17487/rfc2995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography