Sciweavers

95 search results - page 5 / 19
» Fast Multiparty Multiplications from shared bits
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 11 months ago
An Empirical Study on Content Bundling in BitTorrent Swarming System
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. ...
Jinyoung Han, Taejoong Chung, Seungbae Kim, Hyunch...
IJNSEC
2008
96views more  IJNSEC 2008»
14 years 11 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
EUROCRYPT
2000
Springer
15 years 2 months ago
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication
Abstract. This paper proposes a fast parallel Montgomery multiplication algorithm based on Residue Number Systems (RNS). It is easy to construct a fast modular exponentiation by ap...
Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano,...
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 9 months ago
Feedback Capacity of the Gaussian Interference Channel to within 2 Bits
We characterize the capacity region to within 2 bits/s/Hz and the symmetric capacity to within 1 bit/s/Hz for the two-user Gaussian interference channel (IC) with feedback. We dev...
Changho Suh, David Tse
INFOCOM
2011
IEEE
14 years 2 months ago
Physical layer wireless security made fast and channel independent
Abstract – There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in...
Shyamnath Gollakota, Dina Katabi