Sciweavers

2432 search results - page 11 / 487
» Cryptographic logical relations
Sort
View
ILP
2005
Springer
15 years 3 months ago
Logical Bayesian Networks and Their Relation to Other Probabilistic Logical Models
Abstract. Logical Bayesian Networks (LBNs) have recently been introduced as another language for knowledge based model construction of Bayesian networks, besides existing languages...
Daan Fierens, Hendrik Blockeel, Maurice Bruynooghe...
CHES
2005
Springer
83views Cryptology» more  CHES 2005»
15 years 3 months ago
Fast Truncated Multiplication for Cryptographic Applications
The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms...
Laszlo Hars
ICALP
2000
Springer
15 years 1 months ago
Lax Logical Relations
Lax logical relations are a categorical generalisation of logical relations; though they preserve product types, they need not preserve exponential types. But, like logical relatio...
Gordon D. Plotkin, John Power, Donald Sannella, Ro...
FPL
2003
Springer
88views Hardware» more  FPL 2003»
15 years 3 months ago
How Secure Are FPGAs in Cryptographic Applications?
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPG...
Thomas J. Wollinger, Christof Paar