In this contribution, we derive a novel parallel formulation of the standard Itoh-Tsujii algorithm for multiplicative inverse computation over GF(2m). The main building blocks use...
Francisco Rodríguez-Henríquez, Guillermo Morales...
- Serial algorithms to evaluate the Gabor transform of a discrete signal are bound by the length of signal for which the transform can be evaluated. The time taken, if machine memo...
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Abstract—In this paper, we present POSTECH Spoken Dialogue System for Electronic Program Guide Information Access (POSSDS-EPG). POSSDS-EPG consists of automatic speech recognizer...
Seokhwan Kim, Cheongjae Lee, Sangkeun Jung, Gary G...
— Recent progress in High-Level Synthesis (HLS) es has helped raise the abstraction level of FPGA programming. However implementation and performance evaluation of the HLS-genera...
Alexandros Papakonstantinou, Yun Liang, John A. St...