Semantic Scholar uses AI to extract papers important to this topic.
The state-of-the-art hardware platforms for training deep neural networks are moving from traditional single precision (32-bit… Expand This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-exchange software on three different… Expand This paper presents first results of the Networking and Cryptography library (NaCl) on the 8-bit AVR family of microcontrollers… Expand This paper presents an asynchronous SAR ADC for flexible, low energy radios. To achieve excellent power efficiency for a… Expand In this paper, we propose a new descriptor for texture classification that is robust to image blurring. The descriptor utilizes… Expand This paper presents a successive approximation register analog-to-digital converter (SAR ADC) design for bio-medical applications… Expand Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by… Expand Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher is a 16-round Feistel network… Expand The audio watermarking method presented below offers copyright protection to an audio signal by modifying its temporal… Expand Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand