Search Results - "Hoornaert, F."

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Security and performance optimization of a new DES data encryption chip by Verbauwhede, I., Hoornaert, F., Vandewalle, J., De Man, H.J.

    Published in IEEE journal of solid-state circuits (01-06-1988)
    “…The implementation of a high-performance data encryption standard (DES) data encryption chip is presented. At the system design level, cryptographical…”
    Get full text
    Journal Article
  2. 2

    Parental symbolism in the doctor image of asthmatic patients by Pierloot, R, Hoornaert, F

    Published in Psychotherapy and psychosomatics (1978)
    “…In a group of asthmatic adult subjects (n = 88) the maternal and paternal aspects in the doctor image have been invesigated. The Semantic Differential…”
    Get more information
    Journal Article
  3. 3
  4. 4
  5. 5

    Agglomeration behaviour of powders in a Lödige mixer granulator by Hoornaert, Frederik, Wauters, Philippe A.L., Meesters, Gabrie M.H., Pratsinis, Sotiris E., Scarlett, Brian

    Published in Powder technology (01-05-1998)
    “…The agglomeration of a powder mixture which is commonly used to make granules containing enzyme was examined in a high shear mixer granulator of the Lödige…”
    Get full text
    Journal Article
  6. 6
  7. 7

    The effects of heat and mass transfer in thermogravimetrical analysis. A case study towards the catalytic oxidation of soot by Neeft, John P.A., Hoornaert, Fred, Makkee, Michiel, Moulijn, Jacob A.

    Published in Thermochimica acta (01-10-1996)
    “…A convenient model has been developed which qualitatively describes the heat and oxygen mass transport within a TGA sample crucible. The major conclusion from…”
    Get full text
    Journal Article
  8. 8
  9. 9

    ASIC cryptographical processor based on DES by Verbauwhede, I., Hoornaert, F., Vandewalle, J., De Man, H.

    Published in Euro ASIC '91 (1991)
    “…To date, many commercial applications in telecommunications, data transmission and data storage require a high level of cryptographical protection. The ASIC…”
    Get full text
    Conference Proceeding
  10. 10

    Security and Performance Optimization of a new DES data encryption chip by Verbauwhede, I., Hoornaert, F., Vandewalle, J., De Man, H.

    “…Cryptographical applications demand for high speed and high security. This paper describes the progress in the design and the implementation of a new powerful…”
    Get full text
    Conference Proceeding