Sciweavers

219 search results - page 36 / 44
» Context-aware counter abstraction
Sort
View
FC
2004
Springer
129views Cryptology» more  FC 2004»
15 years 2 months ago
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Abstract. Systems for the support of customer relationship management are becoming increasingly attractive for vendors. Loyalty systems provide an interesting possibility for vendo...
Matthias Enzmann, Marc Fischlin, Markus Schneider ...
75
Voted
ACNS
2010
Springer
189views Cryptology» more  ACNS 2010»
15 years 2 months ago
High Performance GHASH Function for Long Messages
Abstract. This work presents a new method to compute the GHASH function involved in the Galois/Counter Mode of operation for block ciphers. If X = X1 . . . Xn is a bit string made ...
Nicolas Meloni, Christophe Nègre, M. Anwar ...
65
Voted
ECOOP
2010
Springer
15 years 2 months ago
Type-Safe Eventful Sessions in Java
Event-driven programming is a major paradigm in concurrent and communication-based programming, and a widely adopted approach to building scalable high-concurrency servers. However...
Raymond Hu, Dimitrios Kouzapas, Olivier Pernet, No...
FCCM
1998
IEEE
113views VLSI» more  FCCM 1998»
15 years 1 months ago
PAM-Blox: High Performance FPGA Design for Adaptive Computing
PAM-Blox are object-oriented circuit generators on top of the PCI Pamette design environment, PamDC. High- performance FPGA design for adaptive computing is simplified by using a ...
Oskar Mencer, Martin Morf, Michael J. Flynn
TAPSOFT
1997
Springer
15 years 1 months ago
Set Operations for Recurrent Term Schematizations
Abstract. Reasoning on programs and automated deduction often require the manipulation of in nite sets of objects. Many formalisms have been proposed to handle such sets. Here we d...
Ali Amaniss, Miki Hermann, Denis Lugiez