Sciweavers

738 search results - page 7 / 148
» Prime Implicant Computation Using Satisfiability Algorithms
Sort
View
GLVLSI
2007
IEEE
166views VLSI» more  GLVLSI 2007»
15 years 1 months ago
Efficient pipelining for modular multiplication architectures in prime fields
This paper presents a pipelined architecture of a modular Montgomery multiplier, which is suitable to be used in public key coprocessors. Starting from a baseline implementation o...
Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid...
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
62
Voted
DCC
2004
IEEE
15 years 9 months ago
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
In this paper, we describe a solution to the register synthesis problem for a class of sequence generators known as Algebraic Feedback Shift Registers. These registers are based o...
Andrew Klapper, Jinzhong Xu
PKDD
1999
Springer
118views Data Mining» more  PKDD 1999»
15 years 1 months ago
Mining Possibilistic Set-Valued Rules by Generating Prime Disjunctions
We describe the problem of mining possibilistic set-valued rules in large relational tables containing categorical attributes taking a finite number of values. An example of such a...
Alexandr A. Savinov
IJFCS
2008
108views more  IJFCS 2008»
14 years 9 months ago
Basic Algorithm for Attribute Implications and Functional Dependencies in Graded Setting
We present GLinClosure, a graded extension of the well-known LinClosure algorithm. GLinClosure can be used to compute degrees of semantic entailment from sets of fuzzy attribute i...
Radim Belohlávek, Vilém Vychodil