Sciweavers

17951 search results - page 119 / 3591
» Network Coding Applications
Sort
View
DCC
2002
IEEE
15 years 9 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
ESSOS
2010
Springer
15 years 6 months ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
ACL2
2006
ACM
15 years 4 months ago
A robust machine code proof framework for highly secure applications
David S. Hardin, Eric W. Smith, William D. Young
MM
2009
ACM
116views Multimedia» more  MM 2009»
15 years 2 months ago
On-the-fly coding for real-time applications
ÐØ ÓÙ ÖÓÒ ÐÐÝ Ø Ó × ÒÓØ Ó Ö ÒÝ Ö Ð¹Ø Ñ Ù Ö Ò¹ Ø ¸ ÁÒØ ÖÒ Ø × ÔÓÔÙÐ Ö ×ÓÐÙØ ÓÒ ØÓ ×ÙÔÔÓÖØ ÑÙÐØ Ñ Ø Ñ ¹ ÓÒ×...
Pierre-Ugo Tournoux, Amine Bouabdallah, Jér...