Sciweavers

2882 search results - page 240 / 577
» Enhancements to the Voting Algorithm
Sort
View
124
Voted
CHES
2004
Springer
128views Cryptology» more  CHES 2004»
15 years 10 months ago
Long Modular Multiplication for Cryptographic Applications
Abstract. A digit-serial, multiplier-accumulator based cryptographic coprocessor architecture is proposed, similar to fix-point DSP's with enhancements, supporting long modula...
Laszlo Hars
ANSS
2003
IEEE
15 years 10 months ago
Sojourn Times and Rare Events
: In this paper, we present and analyze three different algorithms for the evaluation of rare event simulation results. They are loosely based on the AAc method, which in turn is a...
Norbert Th. Müller, Freimut Brenner
SIGGRAPH
1995
ACM
15 years 8 months ago
Stochastic screening dithering with adaptive clustering
We developa clustereddithering methodthatusesstochasticscreening and is able to perform an adaptive variation of the cluster size. This makes it possible to achieve optimal rendit...
Luiz Velho, Jonas Gomes
EUROGRAPHICS
2010
Eurographics
15 years 6 months ago
Contrast-aware Halftoning
This paper proposes two variants of a simple but efficient algorithm for structure-preserving halftoning. Our algorithm extends Floyd-Steinberg error diffusion; the goal of our ex...
Hua Li and David Mould
152
Voted
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 5 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...