Search - Security Engineering and Intelligence Informatics Access content directly

Filter your results

3 results
Keywords : implementation
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine

Danilo Câmara , Conrado Gouvêa , Julio López , Ricardo Dahab
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.137-154
Conference papers hal-01506572v1
Image document

Optimal Parameters for XMSSMT

Andreas Hülsing , Lea Rausch , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers hal-01506577v1