Sciweavers

14 search results - page 2 / 3
» Choice Coordination with Multiple Alternatives (Preliminary ...
Sort
View
EUROCRYPT
2004
Springer
15 years 2 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
63
Voted
SIGMETRICS
2008
ACM
129views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Fine-grained energy profiling for power-aware application design
Significant opportunities for power optimization exist at application design stage and are not yet fully exploited by system and application designers. We describe the challenges ...
Aman Kansal, Feng Zhao
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 9 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot
MICS
2007
88views more  MICS 2007»
14 years 9 months ago
Inversion of Analytic Functions via Canonical Polynomials: A Matrix Approach
An alternative to Lagrange inversion for solving analytic systems is our technique of dual vector fields. We implement this approach using matrix multiplication that provides a f...
Philip Feinsilver, René Schott
SAMOS
2009
Springer
15 years 4 months ago
Visualization of Computer Architecture Simulation Data for System-Level Design Space Exploration
System-level computer architecture simulations create large volumes of simulation data to explore alternative architectural solutions. Interpreting and drawing conclusions from thi...
Toktam Taghavi, Mark Thompson, Andy D. Pimentel