Semantic Scholar uses AI to extract papers important to this topic.
The article tells about the diversity of green spaces in London, the citizens’ attitude toward these spaces, and what Russian… Expand Preface to the Third Edition List of Abbreviations 1 Introduction 1.1 Automatic Identification Systems 1.2 A Comparison of… Expand In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers… Expand With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher… Expand We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure… Expand Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance… Expand To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among… Expand The Mips R10000 is a dynamic, superscalar microprocessor that implements the 64-bit Mips 4 instruction set architecture. It… Expand Abstract : This standard specifies a Secure Hash Algorithm (SHA-1) which can be used to generate a condensed representation of a… Expand Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand