Sciweavers

10819 search results - page 245 / 2164
» Addition and multiplication of sets
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 4 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
EUROCRYPT
2009
Springer
14 years 11 months ago
Double-Base Number System for Multi-scalar Multiplications
Abstract. The Joint Sparse Form is currently the standard representation system to perform multi-scalar multiplications of the form [n]P + m[Q]. We introduce the concept of Joint D...
Christophe Doche, David R. Kohel, Francesco Sica
SIAMIS
2008
141views more  SIAMIS 2008»
13 years 10 months ago
A Nonlinear Inverse Scale Space Method for a Convex Multiplicative Noise Model
We are motivated by a recently developed nonlinear inverse scale space method for image denoising [5, 6], whereby noise can be removed with minimal degradation. The additive noise ...
Jianing Shi, Stanley Osher
DELTA
2006
IEEE
14 years 2 months ago
Modified Montgomery Modular Multiplication Using 4: 2 Compressor and CSA Adder
The efficiency of the Public Key encryption systems like RSA and ECC can be improved with the adoption of a faster multiplication scheme. In this paper, Modified Montgomery multip...
Himanshu Thapliyal, Anvesh Ramasahayam, Vivek Redd...
ISCC
2009
IEEE
198views Communications» more  ISCC 2009»
14 years 5 months ago
An analysis of the heterogeneity and IP packet reordering over multiple wireless networks
Abstract—With the increasing deployment of wireless technologies, such as WLAN, HSDPA, and WiMAX, it is often the case that simultaneous coverage of several access networks is av...
Dominik Kaspar, Kristian Evensen, Audun Fosselie H...