Sciweavers

849 search results - page 90 / 170
» Completely Non-malleable Schemes
Sort
View
DAC
2001
ACM
14 years 11 months ago
Watermarking of SAT using Combinatorial Isolation Lemmas
Watermarking of hardware and software designs is an effective mechanism for intellectual property protection (IPP). Two important criteria for watermarking schemes are credibility...
Rupak Majumdar, Jennifer L. Wong
CHI
2005
ACM
14 years 10 months ago
Navigation via continuously adapted music
Listening to music on personal, digital devices while mobile is an enjoyable, everyday activity. We explore a scheme for exploiting this practice to immerse listeners in navigatio...
Nigel Warren, Matt Jones, Steve Jones, David Bainb...
VLSID
2005
IEEE
158views VLSI» more  VLSID 2005»
14 years 10 months ago
Algorithmic Implementation of Low-Power High Performance FIR Filtering IP Cores
This paper presents two schemes for the implementation of high performance and low power FIR filtering Intellectual Property (IP) cores. Low power is achieved through the utilizat...
C. H. Wang, Ahmet T. Erdogan, Tughrul Arslan
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
14 years 10 months ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
14 years 10 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous