Sciweavers

5344 search results - page 213 / 1069
» Privacy-Preserving Set Operations
Sort
View
69
Voted
ISLPED
1998
ACM
79views Hardware» more  ISLPED 1998»
15 years 7 months ago
Low-energy embedded FPGA structures
This paper introduces an energy-efficient FPGA module, intended for embedded implementations. The main features of the proposed cell include a rich local-interconnect network, whi...
Eric Kusse, Jan M. Rabaey
114
Voted
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
128
Voted
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
15 years 7 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
136
Voted
ASPDAC
2008
ACM
154views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Automated techniques for energy efficient scheduling on homogeneous and heterogeneous chip multi-processor architectures
Abstract-- We address performance maximization of independent task sets under energy constraint on chip multi-processor (CMP) architectures that support multiple voltage/frequency ...
Sushu Zhang, Karam S. Chatha
128
Voted
ECIS
2004
15 years 5 months ago
It outsourcing maturity model
This paper presents a model for analysing IT outsourcing maturity in organizations. Organizations outsource their IT for reasons such as cost reduction, access to superior skill s...
Olayele Adelakun