Sciweavers

429 search results - page 17 / 86
» Permutative Additives and Exponentials
Sort
View
ASIACRYPT
2001
Springer
15 years 7 months ago
Speeding Up XTR
This paper describes several speedups and simplifications for XTR. The most important results are new XTR double and single exponentiation methods where the latter requires a chea...
Martijn Stam, Arjen K. Lenstra
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 9 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
15 years 8 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
AUTOMATICA
2011
14 years 10 months ago
Interval observers for linear time-invariant systems with disturbances
It is shown that, for any time-invariant exponentially stable linear system with additive disturbances, time-varying exponentially stable interval observers can be constructed. Th...
Frédéric Mazenc, Olivier Bernard
MICRO
2005
IEEE
113views Hardware» more  MICRO 2005»
15 years 8 months ago
Thermal Management of On-Chip Caches Through Power Density Minimization
Various architectural power reduction techniques have been proposed for on-chip caches in the last decade. In this paper, we first show that these power reduction techniques can b...
Ja Chun Ku, Serkan Ozdemir, Gokhan Memik, Yehea I....