Login / Signup

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.

Mooseop KimYoungse KimJaecheol RyouSungik Jun
Published in: ATC (2007)
Keyphrases
  • efficient implementation
  • active set
  • hardware implementation
  • linear programming
  • software engineering
  • nonnegative matrix factorization
  • block matching motion estimation