Sciweavers

61 search results - page 5 / 13
» Arbitrary Bit Permutations in One or Two Cycles
Sort
View
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
14 years 1 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
ISCAS
2008
IEEE
154views Hardware» more  ISCAS 2008»
14 years 1 months ago
A 6.3nJ/op low energy 160-bit modulo-multiplier for elliptic curve cryptography processor
— A low energy modulo-multiplier is proposed for elliptic curve cryptography (ECC) processor, especially for authentication in mobile device or key encryption in embedded health-...
Hyejung Kim, Yongsang Kim, Hoi-Jun Yoo
COMBINATORICS
2002
92views more  COMBINATORICS 2002»
13 years 6 months ago
Pattern Avoidance in Permutations: Linear and Cyclic Orders
: We generalize the notion of pattern avoidance to arbitrary functions on ordered sets, and consider specifically three scenarios for permutations: linear, cyclic and hybrid, the f...
Antoine Vella
FCT
2009
Springer
14 years 1 months ago
Directed Graphs of Entanglement Two
Entanglement is a complexity measure for directed graphs that was used to show that the variable hierarchy of the propositional modal µ-calculus is strict. While graphs of entangl...
Erich Grädel, Lukasz Kaiser, Roman Rabinovich
APPT
2009
Springer
14 years 1 months ago
Performance Improvement of Multimedia Kernels by Alleviating Overhead Instructions on SIMD Devices
SIMD extension is one of the most common and effective technique to exploit data-level parallelism in today’s processor designs. However, the performance of SIMD architectures i...
Asadollah Shahbahrami, Ben H. H. Juurlink