Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,296 papers from all fields of science
Search
Sign In
Create Free Account
40-bit encryption
Known as:
40 bit encryption
40-bit encryption refers to a key size of forty bits, or five bytes, for symmetric encryption; this represents a relatively low level of security. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
56-bit encryption
Botnet
Brute-force attack
Byte
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Parameter biasing obfuscation for analog IP protection
V. V. Rao
,
I. Savidis
IEEE International Symposium on Hardware Oriented…
2017
Corpus ID: 20479937
A unique key-based technique that obfuscates the critical biasing conditions of an analog circuit is developed. The proposed…
Expand
2011
2011
A 45-nm 37.3 GOPS/W Heterogeneous Multi-Core SOC with 16/32 Bit Instruction-Set General-Purpose Core
O. Nishii
,
Yoichi Yuyama
,
+9 authors
H. Maejima
IEICE transactions on electronics
2011
Corpus ID: 14877084
We built a 12.4mm × 12.4mm, 45-nm CMOS, chip that integrates eight 648-MHz general purpose cores, two matrix processor (MX-2…
Expand
2010
2010
400-Gb/s Modulation-Format-Independent Single-Channel Transmission With Chromatic Dispersion Precompensation Based on OAWG
D. J. Geisler
,
N. Fontaine
,
+4 authors
S. Yoo
IEEE Photonics Technology Letters
2010
Corpus ID: 2783713
This letter demonstrates the efficacy of an optical arbitrary waveform generation (OAWG) transmitter in generating high-bandwidth…
Expand
2007
2007
ФОРМИРОВАНИЕ ТЕКСТОВЫХ УМЕНИЙ ДЛЯ РЕФЕРИРОВАНИЯ НАУЧНО-ТЕХНИЧЕСКИХ И ГУМАНИТАРНЫХ ТЕКСТОВ (с иностранного на родной язык)
Тохтарь Григорий Иванович
,
Сторчак Олег Григорьевич
,
Татьяна В. Мирошниченко
2007
Corpus ID: 59906896
The paper analyses text activity and determines both text skills and guiding words that are necessary to make an abstract of…
Expand
2006
2006
Design, Simulation, and Testing of a CMOS Analog Decoder for the Block Length-40 UMTS Turbo Code
A. G. Amat
,
S. Benedetto
,
G. Montorsi
,
D. Vogrig
,
A. Neviani
,
A. Gerosa
IEEE Transactions on Communications
2006
Corpus ID: 16759282
In this paper, we present an all-analog implementation of the rate-1/3, block length 40, universal mobile telecommunications…
Expand
2004
2004
The effectiveness of brute force attacks on RC4
N. Couture
,
K. B. Kent
Proceedings. Second Annual Conference on…
2004
Corpus ID: 14486230
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use…
Expand
2003
2003
Vendors push wireless LAN security
L. Paulson
Computer
2003
Corpus ID: 17177707
A vendor consortium has developed technology to shore up security weaknesses that have plagued the popular IEEE 802.11b wireless…
Expand
1995
1995
강원 지역 농촌 주부들의 전통 식생활 관리 현황에 관한 실태 조사(I)
김은실
1995
Corpus ID: 74477246
We have added 35 new items to our web site, according to the major headings and subheadings of the site, as specified below: 3…
Expand
1983
1983
Outline of the Personal Sequential Inference machine: PSI
Shunichi Uchida
,
M. Yokota
,
Akira Yamamoto
,
K. Taki
,
H. Nishikawa
New generation computing
1983
Corpus ID: 8163571
PSI is a personal computer system being developed as a tool for providing researchers with an efficient programming environment…
Expand
1958
1958
Binary arithmetic for discretely variable word length in a serial computer
P. Ercoli
,
R. Vacca
ACM '58
1958
Corpus ID: 11522192
The serial computer FINAC, a Ferranti l~lark I machine installed at the Consiglio Nazionale delle Ricerche in Rome, has been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE