Sciweavers

2766 search results - page 365 / 554
» Algorithms for trigonometric polynomials
Sort
View
ENC
2004
IEEE
15 years 8 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe
EDBT
2006
ACM
142views Database» more  EDBT 2006»
15 years 8 months ago
Conflicting XML Updates
There has been growing interest in the addition of update operations to languages that operate on XML data, for example, XQuery and XJ. These update operations support efficient an...
Mukund Raghavachari, Oded Shmueli
123
Voted
EUROCRYPT
2006
Springer
15 years 8 months ago
VSH, an Efficient and Provable Collision-Resistant Hash Function
Abstract. We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant assuming the hardness of finding nontrivial modular square roots of ver...
Scott Contini, Arjen K. Lenstra, Ron Steinfeld
DAC
1995
ACM
15 years 8 months ago
Register Allocation and Binding for Low Power
This paper describes a technique for calculating the switching activity of a set of registers shared by di erent data values. Based on the assumption that the joint pdf (probabili...
Jui-Ming Chang, Massoud Pedram
ISSAC
1995
Springer
174views Mathematics» more  ISSAC 1995»
15 years 8 months ago
Numerical Uniformization of Hyperelliptic Curves
Abstract. In this paper we derive an algorithm that computes, for a given algebraic hyperelliptic plane curve C of genus p, p > 1, defined by a polynomial y2 = (x−λ1) · · ...
Klaus-Dieter Semmler, Mika Seppälä