Sciweavers

5056 search results - page 317 / 1012
» Network Coding Theory
Sort
View
ICSM
1997
IEEE
15 years 8 months ago
Software Change Through Design Maintenance
Conventional software engineering tends to focus on a small part of the software life cycle: the design and implementation of a product. The bulk of the lifetime cost is in the ma...
Ira D. Baxter, Christopher Pidgeon
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 7 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
IJNSEC
2007
118views more  IJNSEC 2007»
15 years 3 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
IACR
2011
141views more  IACR 2011»
14 years 3 months ago
Approximate common divisors via lattices
We analyze the multivariate generalization of Howgrave-Graham’s algorithm for the approximate common divisor problem. In the m-variable case with modulus N and approximate common...
Henry Cohn, Nadia Heninger
117
Voted
DATE
2007
IEEE
133views Hardware» more  DATE 2007»
15 years 10 months ago
Butterfly and benes-based on-chip communication networks for multiprocessor turbo decoding
Several research activities have recently emerged aiming to propose multiprocessor implementations in order to achieve flexible and high throughput parallel iterative decoding. Be...
Hazem Moussa, Olivier Muller, Amer Baghdadi, Miche...