Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Sandra Dominikus"'
Autor:
Sandra Dominikus, Stefan Kraxberger
Publikováno v:
Security and Communication Networks. 7:2639-2653
The functional capabilities of radio-frequency identification (RFID) tags are rapidly increasing. Therefore, they can no longer be treated as pure bar-code substitute, but they should be considered as computing devices. Modern tags are able to store
Publikováno v:
IEEE Transactions on Computers. 52:483-491
This article presents a highly regular and scalable AES hardware architecture, suited for full-custom as well as for semicustom design flows. Contrary to other publications, a complete architecture (even including CBC mode) that is scalable in terms
Publikováno v:
PerCom Workshops
Coupons are a very well established way of providing a benefit to a customer for a specific activity to improve the business (e.g. looking at an advertisement). They represent a small value, but a high number of uncontrolled copies of coupons can res
Autor:
Sandra Dominikus, Manfred Josef Aigner
Publikováno v:
AINA Workshops (2)
Near field communication (NFC) is a short-range wireless communication standard. It is very comfortable for the user as communication starts without any further configuration steps when bringing two devices very close together. This property makes th
Publikováno v:
Advanced Encryption Standard – AES ISBN: 9783540265573
AES Conference
AES Conference
In this article, we present two AES hardware architectures: one for ASICs and one for FPGAs. Both architectures utilize the similarities of encryption and decryption to provide a high throughput using only a relatively small area. The presented archi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4c2f6f8518f65ec45835096c04052eca
https://doi.org/10.1007/11506447_9
https://doi.org/10.1007/11506447_9
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540226666
CHES
CHES
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where objects have to be identified automatically. This paper presents issues concerning security and privacy of RFID systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6814a5cd779e4fce6ecb7b05afec6420
https://doi.org/10.1007/978-3-540-28632-5_26
https://doi.org/10.1007/978-3-540-28632-5_26
Autor:
Sandra Dominikus
Publikováno v:
ICECS
This article presents the design of an integrated circuit which is able to perform various different hash algorithms of the MD4 family. Hash algorithms are used for digital signature schemes, data integrity, message authentication, and other cryptogr