Sciweavers

10819 search results - page 9 / 2164
» Addition and multiplication of sets
Sort
View
128
Voted
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
105
Voted
CPC
2007
91views more  CPC 2007»
15 years 3 months ago
Additive and Multiplicative Structure in Matrix Spaces
Mei-Chu Chang
FPL
2004
Springer
75views Hardware» more  FPL 2004»
15 years 9 months ago
Multiple Restricted Multiplication
Abstract. This paper focuses on a class of problem relating to the multiplication of a single number by several coefficients that, while not constant, are drawn from a finite set ...
Nalin Sidahao, George A. Constantinides, Peter Y. ...
ISCAS
2006
IEEE
77views Hardware» more  ISCAS 2006»
15 years 10 months ago
A parallel search algorithm for CLNS addition optimization
— We present analytical formulas for the calculation of the memory requirements for a system using the Complex Logarithmic Number System (CLNS). Certain properties of the CLNS ad...
Panagiotis D. Vouzis, Mark G. Arnold
ITNG
2007
IEEE
15 years 10 months ago
SPA resistant Elliptic Curve Cryptosystem using Addition Chains
: There has been a lot of interest in recent years in the problems faced by cryptosystems due to side channel attacks. Algorithms for elliptic curve point scalar multiplication suc...
Andrew Byrne, Nicolas Meloni, Francis M. Crowe, Wi...