Sciweavers

93 search results - page 7 / 19
» Applications of The Montgomery Exponent
Sort
View
MICCAI
2001
Springer
13 years 11 months ago
A Microsurgery Simulation System
Computer systems for surgical planning and training are poised to greatly impact the traditional versions of these tasks. These systems provide an opportunity to learn surgical tec...
Joel Brown, Kevin Montgomery, Jean-Claude Latombe,...
ANTS
2006
Springer
139views Algorithms» more  ANTS 2006»
13 years 11 months ago
Hard Instances of the Constrained Discrete Logarithm Problem
The discrete logarithm problem (DLP) generalizes to the constrained DLP, where the secret exponent x belongs to a set known to the attacker. The complexity of generic algorithms f...
Ilya Mironov, Anton Mityagin, Kobbi Nissim
TIFS
2008
159views more  TIFS 2008»
13 years 7 months ago
Chaotic-Type Features for Speech Steganalysis
We investigate the use of chaotic-type features for recorded speech steganalysis. Considering that data hiding within a speech signal distorts the chaotic properties of the origina...
Osman Hilmi Kocal, Emrah Yürüklü, I...
ATVA
2006
Springer
106views Hardware» more  ATVA 2006»
13 years 11 months ago
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains
Motivated by recent applications of pushdown systems to computer security problems, we present an efficient algorithm for the reachability problem of alternating pushdown systems. ...
Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier E...
DATE
2002
IEEE
104views Hardware» more  DATE 2002»
14 years 9 days ago
Closed-Form Crosstalk Noise Metrics for Physical Design Applications
In this paper we present efficient closed-form formulas to estimate capacitive coupling-induced crosstalk noise for distributed RC coupling trees. The efficiency of our approach...
Lauren Hui Chen, Malgorzata Marek-Sadowska