Sciweavers

679 search results - page 42 / 136
» codes 2002
Sort
View
DCC
2002
IEEE
16 years 2 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
ACSAC
2002
IEEE
15 years 8 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
110
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
DATE
2002
IEEE
161views Hardware» more  DATE 2002»
15 years 7 months ago
Hardware/Software Trade-Offs for Advanced 3G Channel Coding
Third generation’s wireless communications systems comprise advanced signal processing algorithms that increase the computational requirements more than ten-fold over 2G’s sys...
Heiko Michel, Alexander Worm, Norbert Wehn, Michae...
DCC
2002
IEEE
15 years 7 months ago
Data Compression of Correlated Non-Binary Sources Using Punctured Turbo Codes
We consider the case of two corr elated non-binary sources. Data compression is achieved by transforming the sequences of non-binary symbols into sequences of bits and then using ...
Ying Zhao, Javier Garcia-Frias