785 research outputs found

    Assessing Financial Stability of Suppliers: Avoiding Potential Distress

    Get PDF
    OEM and Tier One suppliers must move to employ a comprehensive financial and operational review of their supply chain.supply chain, financial stability, automotive manufacturing, BBK ratings, supply base

    Formal and Informal Learning Experiences in Second Life: An Overview

    Get PDF
    A growing number of higher education institutions, consortiums and libraries are establishing presences in the virtual world of Second Life. Millions of adults currently engage in both formal and informal learning experiences in SL and the numbers are growing. This paper provides an overview of this phenomenon

    The Flora of the Ledges Region of Boone County, Iowa

    Get PDF
    In the south-central part of Boone County is an area that possesses characteristic plants as well as peculiar geological and topographic features. This is located four miles directly south of Boone and extends for about two miles south toward and along the Des Moines River. Its name The Ledges is appropriate because of striking sandstone cliffs from ten to over forty feet in height, extending beyond the perpendicular in some cases as much as twelve feet. This ledge rock here comprises an island of younger massive sandstone surrounded unconformably by somewhat older Carboniferous layers, which are of different structure. The conditions peculiar to this restricted locality give the flora a distinctive character

    Interview of David Diehl

    Get PDF
    Mr. David Diehl has been a faculty member, administrator and coach at La Salle College High School for 47 years (since 1961). He is also a graduate of LSCHS in 1955. Mr. Diehl has served La Salle in many capacities including teacher, coach, disciplinarian and principal. His leadership skills led La Salle into the twentieth century overseeing the schools advancements in technology and the building of La Salle’s St. Michael’s Hall, and the West Wing. I met Mr. Diehl on two consecutive days during second period, which is from 9:00-9:40 AM. We met in his office on the first floor of La Salle’s original academic wing, McLean Hall

    MIPS Assembly Language Implementation of GIFT-64-128 Encryption

    Get PDF
    The GIFT-64-128 block cipher encryption is implemented in MIPS assembly language. The program is assembled and simulated using the QtSPIM simu-lator and produces functionally correct results. This implementation requires 22,764 clock cycles per 64-bit block encryption, as well as 1,296 bytes of code, and 192 bytes of data memory. The major functional units of the im-plementation are analyzed in terms of cycle count and bytes of code

    Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language

    Get PDF
    The encryption mode of the Tweakable Block Cipher (TBC) of the SCREAM Authenticated Cipher is implemented in the MSP430 microcontroller. Assembly language versions of the TBC are prepared using both precomputed tweak keys and tweak keys computed “on-the-fly.” Both versions are compared against published results for the assembly language version of SCREAM on the ATMEL AVR microcontroller, and against the C reference implementation in terms of performance and size. The assembly language version using precomputed tweak keys achieves a speedup of 1.7 and memory savings of 9 percent over the reported SCREAM implementation in the ATMEL AVR. The assembly language version using tweak keys computed “on-the-fly” achieves a speedup of 1.6 over the ATMEL AVR version while reducing memory usage by 15 percent

    Attack on AES Implementation Exploiting Publicly-visible Partial Result

    Get PDF
    Although AES is designed to be secure against a wide variety of linear and differential attacks, security ultimately depends on a combination of the engineering implementation and proper application by intended users. In this work, we attack a publicly-available VHDL implementation of AES by exploiting a partial result visible at the top-level public interface of the implementation. The vulnerability renders the security of the implementation equivalent to a one-round version of AES. An algorithm is presented that exploits this vulnerability to recover the secret key in 2^31 operations. The algorithm is coded in an interpreted high-level language and successfully recovers secret keys, with one set of known plaintext, using a general-purpose CPU in an average of 30 minutes

    The short-time Dynamics of the Critical Potts Model

    Full text link
    The universal behaviour of the short-time dynamics of the three state Potts model in two dimensions at criticality is investigated with Monte Carlo methods. The initial increase of the order is observed. The new dynamic exponent θ\theta as well as exponent zz and β/ν\beta/\nu are determined. The measurements are carried out in the very beginning of the time evolution. The spatial correlation length is found to be very short compared with the lattice size.Comment: 6 pages, 3 figure
    • …
    corecore