Hamming weight

Results: 44



#Item
11Data types / Computer arithmetic / C programming language / Primitive types / C++ / Integer / Hamming weight / Type system / Signedness / Computing / Software engineering / Computer programming

WG 14, N1899 Integer Precision Bits Update David Svoboda Date: –

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2014-12-18 12:46:51
12Mathematics / Hamming distance / Hamming / String / Pattern matching / List decoding / Hamming weight / Coding theory / Information theory / Discrete mathematics

Advanced Algorithms – COMS31900Lecture 13 Approximate pattern matching (part two) Benjamin Sach

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:21
13Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
14Schedule / Transaction processing / Hamming weight / Advanced Encryption Standard / Vehicle Identification Number / Cube / Geometry / Euclidean geometry / Data management

First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA Yongdae Kim1,2 and Hyunsoo Yoon1 1 Department of Computer Science, Korea Advanced Institute of Science and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 03:28:54
15Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Data / Hamming weight / Authentication protocol / Password authentication protocol / Information / Computing / Automatic identification and data capture

Yet Another Ultralightweight Authentication Protocol that is Broken Gildas Avoine, Xavier Carpent Universit´e catholique de Louvain B-1348 Louvain-la-Neuve Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 06:16:06
16Probability and statistics / Hamming weight / Variance / Advanced Encryption Standard / Statistics / Coding theory / Normal distribution

Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge1,2 , C´ecile Dumas1 , and Sophie Lambert-Lacroix2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-22 11:14:13
17SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-19 18:19:12
18Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
19Functions and mappings / Computer arithmetic / Find first set / Function / Boolean algebra / Expected value / Hamming weight / Mutual information / Mathematics / Mathematical analysis / Binary arithmetic

C HA PT ER 2 BASICS 2–1 Manipulating Rightmost Bits Some of the formulas in this section find application in later chapters. Use the following formula to turn off the rightmost 1-bit in a word, producing

Add to Reading List

Source URL: www.hackersdelight.org

Language: English - Date: 2012-10-18 22:11:36
20Mathematics / Numbers / Division / Floating point / Hamming weight / GOST / Arithmetic / Binary arithmetic / Computer arithmetic

NPL Report DITC[removed]February 1988 NATIONAL PHYSICAL LABORATORY The Message Authenticator Algorithm (MAA)

Add to Reading List

Source URL: www.cix.co.uk

Language: English - Date: 2000-01-11 12:05:49
UPDATE