Sciweavers

814 search results - page 7 / 163
» Analysis of Modular Arithmetic
Sort
View
PKC
2011
Springer
212views Cryptology» more  PKC 2011»
14 years 22 days ago
On the Correct Use of the Negation Map in the Pollard rho Method
Bos, Kaihara, Kleinjung, Lenstra, and Montgomery recently showed that ECDLPs on the 112-bit secp112r1 curve can be solved in an expected time of 65 years on a PlayStation 3. This p...
Daniel J. Bernstein, Tanja Lange, Peter Schwabe
SAS
2007
Springer
124views Formal Methods» more  SAS 2007»
15 years 4 months ago
Arithmetic Strengthening for Shape Analysis
Abstract. Shape analyses are often imprecise in their numerical reasoning, whereas numerical static analyses are often largely unaware of the shape of a program’s heap. In this p...
Stephen Magill, Josh Berdine, Edmund M. Clarke, By...
EUSFLAT
2009
262views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Type-2 Fuzzy Arithmetic using Alpha-planes
Abstract-- This paper examines type-2 fuzzy arithmetic using interval analysis. It relies heavily on alpha-cuts and alpha-planes. Furthermore, we discuss the use of quasi type-2 fu...
Hussam Hamrawi, Simon Coupland
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 1 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
MLQ
2007
65views more  MLQ 2007»
14 years 9 months ago
Non-standard analysis in ACA0 and Riemann mapping theorem
Abstract. This research is motivated by the program of Reverse Mathematics and non-standard arguments in second-order arithmetic. Within a weak subsystem of second order arithmetic...
Keita Yokoyama