Sciweavers

192 search results - page 16 / 39
» Arithmetic Optimization Using Carry-Save-Adders
Sort
View
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 26 days ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
ASAP
2003
IEEE
141views Hardware» more  ASAP 2003»
14 years 21 days ago
Automatic Instruction Set Extension and Utilization for Embedded Processors
There is a growing demand for application-specific embedded processors in system-on-a-chip designs. Current tools and design methodologies often require designers to manually spec...
Armita Peymandoust, Laura Pozzi, Paolo Ienne, Giov...
MEMICS
2010
13 years 2 months ago
GPU-Based Sample-Parallel Context Modeling for EBCOT in JPEG2000
Embedded Block Coding with Optimal Truncation (EBCOT) is the fundamental and computationally very demanding part of the compression process of JPEG2000 image compression standard. ...
Jiri Matela, Vit Rusnak, Petr Holub
ICASSP
2011
IEEE
12 years 11 months ago
Efficient context adaptive entropy coding for real-time applications
Context based entropy coding has the potential to provide higher gain over memoryless entropy coding. However serious difficulties arise regarding the practical implementation in...
Guillaume Fuchs, Vignesh Subbaraman, Markus Multru...
ASIACRYPT
2001
Springer
13 years 12 months ago
A Compact Rijndael Hardware Architecture with S-Box Optimization
Compact and high-speed hardware architectures and logic optimization methods for the AES algorithm Rijndael are described. Encryption and decryption data paths are combined and all...
Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji M...