Sciweavers

22193 search results - page 53 / 4439
» Multiple Restricted Multiplication
Sort
View
CHES
2010
Springer
183views Cryptology» more  CHES 2010»
14 years 11 months ago
Coordinate Blinding over Large Prime Fields
In this paper we propose a multiplicative blinding scheme for protecting implementations of a scalar multiplication over elliptic curves. Specifically, this blinding method applies...
Michael Tunstall, Marc Joye
NIPS
2000
15 years 15 days ago
Balancing Multiple Sources of Reward in Reinforcement Learning
For many problems which would be natural for reinforcement learning, the reward signal is not a single scalar value but has multiple scalar components. Examples of such problems i...
Christian R. Shelton
AAECC
2000
Springer
81views Algorithms» more  AAECC 2000»
14 years 11 months ago
On Short Multiplications and Divisions
Computing only the low degree terms of the product of two univariate polynomials is called a short multiplication. By decomposition into subproblems, a short multiplication can be ...
Thom Mulders
ARITH
2007
IEEE
15 years 5 months ago
Fast Modular Reduction
It is widely acknowledged that efficient modular multiplication is a key to high-performance implementation of public-key cryptography, be it classical RSA, Diffie-Hellman, or (hy...
William Hasenplaugh, Gunnar Gaubatz, Vinodh Gopal
ICC
2007
IEEE
15 years 5 months ago
New UWB Receiver Designs Based on a Gaussian-Laplacian Noise-Plus-MAI Model
—Two novel receiver structures which surpass the performance of the conventional matched filter receiver are proposed for ultra-wide bandwidth multiple access communications. Th...
Norman C. Beaulieu, Somasundaram Niranjayan