Cryptanalytic Attacks on RSARSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.... | | Manage IT!: Organizing IT Demand and IT Supply"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good... | | Direct Transistor-Level Layout for Digital BlocksCell-based design methodologies have dominated layout generation of digital circuits. Unfortunately, the growing demands for transparent process portability, increased performance, and low-level device sizing for timing/power are poorly handled in a fixed cell library.
Direct Transistor-Level Layout For Digital Blocks... |