Ara
Toplam kayıt 18, listelenen: 11-18
Algebraic construction of cryptographically good binary linear transformations
(Wiley-Hindawi, 2014)
[Abstract Not Available]
On the algebraic construction of cryptographically good 32 x 32 binary linear transformations
(Elsevier Science Bv, 2014)
Binary linear transformations (also called binary matrices) have matrix representations over GF(2). Binary matrices are used as diffusion layers in block ciphers such as Camellia and ARIA. Also, the 8 x 8 and 16 x 16 binary ...
Effects of using a force feedback haptic augmented simulation on the attitudes of the gifted students towards studying chemical bonds in virtual reality environment
(Taylor & Francis Ltd, 2017)
The aim of this study is to identify the effects of force feedback haptic applications developed in virtual reality environments (VREs), which is an important field of study in computer science and engineering, on gifted ...
Real-Time Traffic Classification using Simple CART Forest on FPGAs
(Ieee, 2018)
Traffic classification process categorizes internet traffic into application classes by exploiting packet header data or collected packet statistics. Real-time internet traffic classification is mostly required for network ...
A new involutory 4×4 MDS matrix for the AES-like block ciphers
(2011)
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known block ciphers like the Advanced Encryption Standard (AES) and Khazad. The reason for the use of MDS codes in the design ...
Design of a touch sensation application including surface tension sample using a haptic device in engineering education
(Wiley, 2019)
This paper illustrates the effects of force feedback haptic applications as an educational material on the attitudes of students in engineering education. For this purpose, a simulation design has been carried out on a ...
Simple CART Based Real-Time Traffic Classification Engine on FPGAs
(Ieee, 2017)
Traffic classification is a process which assorts computer network traffic into predefined traffic classes by utilizing packet header information or network packet statistics. Real-time traffic classification is mainly ...
On the algebraic expression of the AES S-box like S-boxes
(2010)
In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure of ...