Sciweavers

694 search results - page 8 / 139
» The Power of the Middle Bit
Sort
View
ISLPED
1998
ACM
72views Hardware» more  ISLPED 1998»
15 years 1 months ago
Power invariant vector compaction based on bit clustering and temporal partitioning
Nicola Dragone, Roberto Zafalon, Carlo Guardiani, ...
62
Voted
WCNC
2010
IEEE
14 years 7 months ago
One-Bit Feedback Selection Schemes for Power-Efficient Multiuser and Multirelay Systems
Viet-Anh Le, Taneli Riihonen, Risto Wichman, Steve...
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
15 years 1 months ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
84
Voted
IJNSEC
2006
61views more  IJNSEC 2006»
14 years 9 months ago
Is There a Shortage of Primes for Cryptography?
Cryptographic algorithms often prescribe the use of primes whose length in bits is a power of 2. Recently, we proved that for m > 1, there is no prime number with 2m significan...
Samuel S. Wagstaff Jr.