Sciweavers

384 search results - page 11 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 6 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler
CORR
2010
Springer
158views Education» more  CORR 2010»
14 years 6 months ago
Efficient Approaches for Designing Fault Tolerant Reversible Carry Look-Ahead and Carry-Skip Adders
Combinational or Classical logic circuits dissipate heat for every bit of information that is lost. Information is lost when the input vector cannot be recovered from its correspon...
Md. Saiful Islam 0003, Muhammad Mahbubur Rahman, Z...
ACST
2006
15 years 1 months ago
Software obfuscation from crackers' viewpoint
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-cent...
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden
ICML
2007
IEEE
16 years 15 days ago
Simpler core vector machines with enclosing balls
The core vector machine (CVM) is a recent approach for scaling up kernel methods based on the notion of minimum enclosing ball (MEB). Though conceptually simple, an efficient impl...
András Kocsor, Ivor W. Tsang, James T. Kwok
FCCM
1999
IEEE
111views VLSI» more  FCCM 1999»
15 years 4 months ago
Optimizing FPGA-Based Vector Product Designs
This paper presents a method, called multiple constant multiplier trees MCMTs, for producing optimized recon gurable hardware implementations of vector products. An algorithm for ...
Dan Benyamin, John D. Villasenor, Wayne Luk