Sciweavers

274 search results - page 30 / 55
» Counting lattice vectors
Sort
View
SDM
2007
SIAM
98views Data Mining» more  SDM 2007»
15 years 1 months ago
Lattice based Clustering of Temporal Gene-Expression Matrices
Individuals show different cell classes when they are in the different stages of a disease, have different disease subtypes, or have different response to a treatment or envir...
Yang Huang, Martin Farach-Colton
IACR
2011
155views more  IACR 2011»
13 years 11 months ago
Terminating BKZ
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
ASAP
2007
IEEE
219views Hardware» more  ASAP 2007»
15 years 6 months ago
SIMD Vectorization of Histogram Functions
Existing SIMD extensions cannot efficiently vectorize the histogram function due to memory collisions. We propose two techniques to avoid this problem. In the first, a hierarchi...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
DATE
2007
IEEE
150views Hardware» more  DATE 2007»
15 years 6 months ago
Fast memory footprint estimation based on maximal dependency vector calculation
In data dominated applications, loop transformations have a huge impact on the lifetime of array data and therefore on memory footprint. Since a locally optimal loop transformatio...
Qubo Hu, Arnout Vandecappelle, Per Gunnar Kjeldsbe...
ACISP
2001
Springer
15 years 4 months ago
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
Amr M. Youssef, Guang Gong