Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
With China's rapid economic development, electricity supply is relatively shortage, and the contradiction of power coal supply and demand is prominent. In this context, using...
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
The instruction cache has been recognized as one of the least hot units in microprocessors, which leaves the instruction cache largely ignored in onchip thermal management. Consequ...
Joonho Kong, Johnsy K. John, Eui-Young Chung, Sung...