First Page | Meta Content | |
---|---|---|
Document Date: 2011-08-28 10:58:11Open Document File Size: 277,50 KBShare Result on FacebookCompanyCBC / Texas Instruments / Knudsen / Intel / IAR Systems / the AES / /CountryJapan / United States / / /FacilityCMOS ASIC library / American National Institute of Standards and Technology / Computer Science University of Twente / /IndustryTermcheaper solutions / energy-efficency / brute-force search / software implementations / decryption algorithm / wireless sensor network / Wireless Sensor Networks / transmission energy / exhaustive key search / energy supply / secure algorithm / exhaustive search / energy / energy-efficient block cipher / wireless sensors / target computing platform / public-key algorithms / energy-efficiency / energy efficiency requirements / software platforms / brute force search / little energy / energy efficiency / computing / expansion algorithm / encryption algorithm / 3GPPendorsed encryption algorithm / /OperatingSystemGNU / /OrganizationInformation-technology Promotion Agency / Cryptography Research and Evaluation Committee / European Central Bank / ASIC / University of Twente / Pieter Hartel Faculty of Electrical Engineering / American National Institute of Standards and Technology / /PersonWei Dai / Yee Wei Law / Rijndael / Pieter Hartel / /Positionintegrated C-Spy / /ProductDebug / /ProgrammingLanguageFL / C / C++ / /TechnologyRAM / encryption algorithm / sufficiently secure algorithm / block cipher / Rijndael encryption / html / Encryption / Cryptography / ASIC / Flash memory / public-key algorithms / decryption algorithm / 3GPPendorsed encryption algorithm / key expansion algorithm / /URLwww.iar.com / http /SocialTag |