Sciweavers

199 search results - page 7 / 40
» The Residue Logarithmic Number System: Theory and Implementa...
Sort
View
CORR
2000
Springer
134views Education» more  CORR 2000»
14 years 9 months ago
Learning Complexity Dimensions for a Continuous-Time Control System
This paper takes a computational learning theory approach to a problem of linear systems identification. It is assumed that inputs are generated randomly from a known class consist...
Pirkko Kuusela, Daniel Ocone, Eduardo D. Sontag
AFRICACRYPT
2009
Springer
14 years 7 months ago
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-ke...
Owen Harrison, John Waldron
INFORMATICALT
2002
103views more  INFORMATICALT 2002»
14 years 9 months ago
Numerical Representations as Purely Functional Data Structures: a New Approach
This paper is concerned with design, implementation and verification of persistent purely functional data structures which are motivated by the representation of natural numbers us...
Mirjana Ivanovic, Viktor Kuncak
WSS
2001
131views Control Systems» more  WSS 2001»
14 years 11 months ago
The Theory of Weak Stabilization
We investigate a new property of computing systems called weak stabilization. Although this property is strictly weaker than the well-known property of stabilization, weak stabiliz...
Mohamed G. Gouda
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
15 years 10 months ago
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
We have devised a frequency injection attack which is able to destroy the source of entropy in ring-oscillator-based true random number generators (TRNGs). A TRNG will lock to freq...
A. Theodore Markettos, Simon W. Moore