Sciweavers

1532 search results - page 175 / 307
» A Comparison of RESTART Implementations
Sort
View
ASIACRYPT
2008
Springer
15 years 3 days ago
Twisted Edwards Curves Revisited
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a ...
Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Car...
DBSEC
2007
128views Database» more  DBSEC 2007»
14 years 11 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
DAGSTUHL
2008
14 years 11 months ago
Real Algebraic Numbers: Complexity Analysis and Experimentation
Abstract. We present algorithmic, complexity and implementation results concerning real root isolation of a polynomial of degree d, with integer coefficients of bit size , using S...
Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsig...
WEBIST
2008
14 years 11 months ago
A Web-Based Version of a Trivial Game to Promote Galician Culture
We present in this paper the architecture and some implementation details of a web-based version of a Trivial game. Our implementation achieves such a high degree of interactivity ...
Miguel Rodríguez Luaces, Oscar Pedreira, &A...
ALENEX
2004
107views Algorithms» more  ALENEX 2004»
14 years 11 months ago
An Experimental Analysis of a Compact Graph Representation
In previous work we described a method for compactly representing graphs with small separators, which makes use of small separators, and presented preliminary experimental results...
Daniel K. Blandford, Guy E. Blelloch, Ian A. Kash