Sciweavers

2767 search results - page 90 / 554
» Universal Exponentiation Algorithm
Sort
View
PTS
2004
88views Hardware» more  PTS 2004»
14 years 11 months ago
From Design to Test with UML: Applied to a Roaming Algorithm for Bluetooth Devices
The UML Testing Profile provides support for UML based model-driven testing. This paper introduces a methodology of how to use the testing profile in order to modify and extend an ...
Zhen Ru Dai, Jens Grabowski, Helmut Neukirchen, Ho...
ORL
1998
68views more  ORL 1998»
14 years 9 months ago
A fast bipartite network flow algorithm for selective assembly
Bipartite network flow problems naturally arise in applications such as selective assembly and preemptive scheduling. This paper presents fast algorithms for these problems that ...
Satoru Iwata, Tomomi Matsui, S. Thomas McCormick
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
15 years 3 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
DCC
2002
IEEE
15 years 9 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
CP
2005
Springer
15 years 3 months ago
AND/OR Branch-and-Bound for Solving Mixed Integer Linear Programming Problems
Abstract. AND/OR search spaces have recently been introduced as a unifying paradigm for advanced algorithmic schemes for graphical models. The main virtue of this representation is...
Radu Marinescu 0002, Rina Dechter