Sciweavers

4498 search results - page 776 / 900
» The Power of Data
Sort
View
ASIACRYPT
2010
Springer
14 years 8 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
DSD
2010
IEEE
137views Hardware» more  DSD 2010»
14 years 8 months ago
A C-to-RTL Flow as an Energy Efficient Alternative to Embedded Processors in Digital Systems
We present a high-level synthesis flow for mapping an algorithm description (in C) to a provably equivalent registertransfer level (RTL) description of hardware. This flow uses an ...
Sameer D. Sahasrabuddhe, Sreenivas Subramanian, Ku...
ERSA
2010
187views Hardware» more  ERSA 2010»
14 years 8 months ago
An Open Source Circuit Library with Benchmarking Facilities
In this paper, we introduce the open-source PivPav backend tool for reconfigurable computing. Essentially, PivPav provides an interface to a library of digital circuits that are ke...
Mariusz Grad, Christian Plessl
ICIP
2010
IEEE
14 years 8 months ago
Correlation histogram analysis of depth-enhanced 3D video coding
This paper introduces a correlation histogram method for analyzing the different components of depth-enhanced 3D video representations. Depth-enhanced 3D representations such as m...
Philipp Merkle, Jordi Bayo Singla, Karsten Mü...
PIMRC
2010
IEEE
14 years 7 months ago
Low-complexity admission control for distributed power-controlled networks with stochastic channels
This study addresses the general problem of efficient resource management in wireless networks with arbitrary timevarying topologies. Communication channels are assumed to generall...
Stepán Kucera, Bing Zhang