Sciweavers

93 search results - page 16 / 19
» Applications of The Montgomery Exponent
Sort
View
ARITH
2007
IEEE
14 years 1 months ago
Decimal Floating-Point Multiplication Via Carry-Save Addition
Decimal multiplication is important in many commercial applications including financial analysis, banking, tax calculation, currency conversion, insurance, and accounting. This p...
Mark A. Erle, Michael J. Schulte, Brian J. Hickman...
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 1 months ago
Perfect NIZK with Adaptive Soundness
Abstract. This paper presents a very simple and efficient adaptivelysound perfect NIZK argument system for any NP-language. In contrast to recently proposed schemes by Groth, Ostro...
Masayuki Abe, Serge Fehr
IMC
2003
ACM
14 years 18 days ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
CSE
2009
IEEE
14 years 2 days ago
Gaming On and Off the Social Graph: The Social Structure of Facebook Games
—Games built on Online Social Networks (OSNs) have become a phenomenon since 3rd party developer tools were exposed by OSNs such as Facebook. However, apart from their explosive ...
Ben Kirman, Shaun Lawson, Conor Linehan
CCS
1998
ACM
13 years 11 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern