Sciweavers

132
Voted
ANTS
2004
Springer
95views Algorithms» more  ANTS 2004»
15 years 8 months ago
Using Primitive Subgroups to Do More with Fewer Bits
Abstract. This paper gives a survey of some ways to improve the efficiency of discrete log-based cryptography by using the restriction of scalars and the geometry and arithmetic of...
Karl Rubin, Alice Silverberg
142
Voted
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 8 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
ANSS
2004
IEEE
15 years 8 months ago
Optimized Dissemination of Highly Anticipated Content over an Itinerary Based P2P Network
As the Internet evolved, peer-to-peer networks became one of the major enabling technologies. Alternative solutions for several issues emerged with the use o this technology. Such...
Konstantinos G. Zerfiridis, Helen D. Karatza
ANSS
2004
IEEE
15 years 8 months ago
Cache Simulation Based on Runtime Instrumentation for OpenMP Applications
To enable optimizations in memory access behavior of high performance applications, cache monitoring is a crucial process. Simulation of cache hardware is needed in order to allow...
Jie Tao, Josef Weidendorfer
ANSS
2004
IEEE
15 years 8 months ago
Markov Model Based Congestion Control for TCP
The Random Early Detection (RED) scheme for congestion control in TCP is well known over a decade. Due to a number of control parameters in RED, it cannot make acceptable packet-d...
Shan Suthaharan