Sciweavers

17951 search results - page 119 / 3591
» Network Coding Applications
Sort
View
DCC
2002
IEEE
16 years 1 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
82
Voted
ESSOS
2010
Springer
15 years 11 months ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
ACL2
2006
ACM
15 years 8 months ago
A robust machine code proof framework for highly secure applications
David S. Hardin, Eric W. Smith, William D. Young
67
Voted
MM
2009
ACM
116views Multimedia» more  MM 2009»
15 years 7 months ago
On-the-fly coding for real-time applications
ÐØ ÓÙ ÖÓÒ ÐÐÝ Ø Ó × ÒÓØ Ó Ö ÒÝ Ö Ð¹Ø Ñ Ù Ö Ò¹ Ø ¸ ÁÒØ ÖÒ Ø × ÔÓÔÙÐ Ö ×ÓÐÙØ ÓÒ ØÓ ×ÙÔÔÓÖØ ÑÙÐØ Ñ Ø Ñ ¹ ÓÒ×...
Pierre-Ugo Tournoux, Amine Bouabdallah, Jér...