Sciweavers

4305 search results - page 562 / 861
» Analysing Protocol Implementations
Sort
View
ASAP
2002
IEEE
170views Hardware» more  ASAP 2002»
15 years 9 months ago
Reviewing 4-to-2 Adders for Multi-Operand Addition
Recently there has been quite a number of papers discussing the use of redundant 4-to-2 adders for the accumulation of partial products in multipliers, claiming one type to be sup...
Peter Kornerup
BMCBI
2006
111views more  BMCBI 2006»
15 years 4 months ago
SIMMAP: Stochastic character mapping of discrete traits on phylogenies
Background: Character mapping on phylogenies has played an important, if not critical role, in our understanding of molecular, morphological, and behavioral evolution. Until very ...
Jonathan P. Bollback
WISA
2004
Springer
15 years 10 months ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
CRYPTO
2006
Springer
106views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
On Robust Combiners for Private Information Retrieval and Other Primitives
Abstract. Let A and B denote cryptographic primitives. A (k, m)robust A-to-B combiner is a construction, which takes m implementations of primitive A as input, and yields an implem...
Remo Meier, Bartosz Przydatek
SOSP
2007
ACM
16 years 1 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...