Sciweavers

232 search results - page 4 / 47
» An Efficient Implementation of Multiple Return Values in Sch...
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
CONEXT
2007
ACM
13 years 11 months ago
ER: efficient retransmission scheme for wireless LANs
Wireless LANs (WLANs) have been deployed at a remarkable rate at university campuses, office buildings, airports, hotels, and malls. Providing efficient and reliable wireless comm...
Eric Rozner, Anand Padmanabha Iyer, Yogita Mehta, ...
DAC
2004
ACM
14 years 8 months ago
Multiple constant multiplication by time-multiplexed mapping of addition chains
An important primitive in the hardware implementations of linear DSP transforms is a circuit that can multiply an input value by one of several different preset constants. We prop...
James C. Hoe, Markus Püschel, Peter Tummeltsh...
VTC
2008
IEEE
162views Communications» more  VTC 2008»
14 years 1 months ago
A Novel Blind Channel Estimation Algorithm for a MIMO System
—In this paper, a novel blind channel estimation algorithm for a multiple input multiple output (MIMO) system is described. This algorithm is easier to implement than the previou...
Xia Liu, Marek E. Bialkowski, Shiyang Lu, Hon Tat ...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 1 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...