Sciweavers

192 search results - page 16 / 39
» Arithmetic Optimization Using Carry-Save-Adders
Sort
View
110
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 5 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
ASAP
2003
IEEE
141views Hardware» more  ASAP 2003»
15 years 5 months ago
Automatic Instruction Set Extension and Utilization for Embedded Processors
There is a growing demand for application-specific embedded processors in system-on-a-chip designs. Current tools and design methodologies often require designers to manually spec...
Armita Peymandoust, Laura Pozzi, Paolo Ienne, Giov...
118
Voted
MEMICS
2010
14 years 7 months ago
GPU-Based Sample-Parallel Context Modeling for EBCOT in JPEG2000
Embedded Block Coding with Optimal Truncation (EBCOT) is the fundamental and computationally very demanding part of the compression process of JPEG2000 image compression standard. ...
Jiri Matela, Vit Rusnak, Petr Holub
109
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Efficient context adaptive entropy coding for real-time applications
Context based entropy coding has the potential to provide higher gain over memoryless entropy coding. However serious difficulties arise regarding the practical implementation in...
Guillaume Fuchs, Vignesh Subbaraman, Markus Multru...
ASIACRYPT
2001
Springer
15 years 4 months ago
A Compact Rijndael Hardware Architecture with S-Box Optimization
Compact and high-speed hardware architectures and logic optimization methods for the AES algorithm Rijndael are described. Encryption and decryption data paths are combined and all...
Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji M...