Sciweavers

384 search results - page 9 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICLP
2009
Springer
15 years 10 months ago
A Tabling Implementation Based on Variables with Multiple Bindings
Suspension-based tabling systems have to save and restore computation states belonging to OR branches. Stack freezing combined with (forward) trailing is among the better-known imp...
Pablo Chico de Guzmán, Manuel Carro, Manuel...
SICHERHEIT
2008
14 years 11 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
ICIP
1999
IEEE
15 years 11 months ago
Real Time Vector Median Like Filter FPGA Design and Application to Color Image Filtering
In this paper, the hardware implementation of a vector median like filter is proposed. Firstly, the extension of median filtering to the case of multicomponent images is addressed...
Jocelyn Chanussot, Michel Paindavoine, Patrick Lam...
ISVLSI
2007
IEEE
100views VLSI» more  ISVLSI 2007»
15 years 3 months ago
Vector Processing Support for FPGA-Oriented High Performance Applications
In this paper, we propose and implement a vector processing system that includes two identical vector microprocessors embedded in two FPGA chips. Each vector microprocessor suppor...
Hongyan Yang, Shuai Wang, Sotirios G. Ziavras, Jie...
79
Voted
ESOP
2008
Springer
14 years 11 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...