Sciweavers

465 search results - page 29 / 93
» Programmable Hash Functions and Their Applications
Sort
View
PLDI
1998
ACM
15 years 2 months ago
A Study of Dead Data Members in C++ Applications
Object-oriented applications may contain data members that can be removed from the application without a ecting program behavior. Such \dead" data members may occur due to un...
Peter F. Sweeney, Frank Tip
77
Voted
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
15 years 4 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
ARC
2006
Springer
120views Hardware» more  ARC 2006»
15 years 1 months ago
Applications of Small-Scale Reconfigurability to Graphics Processors
We explore the application of Small-Scale Reconfigurability (SSR) to graphics hardware. SSR is an architectural technique wherein functionality common to multiple subunits is reuse...
Kevin Dale, Jeremy W. Sheaffer, Vinu Vijay Kumar, ...
COCO
2010
Springer
168views Algorithms» more  COCO 2010»
14 years 11 months ago
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
We investigate the question of what languages can be decided efficiently with the help of a recursive collisionfinding oracle. Such an oracle can be used to break collisionresistan...
Iftach Haitner, Mohammad Mahmoody, David Xiao
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 5 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes