Sciweavers

604 search results - page 32 / 121
» Efficient Computation of Multiplicative Inverses for Cryptog...
Sort
View
DSD
2006
IEEE
135views Hardware» more  DSD 2006»
13 years 11 months ago
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography
Until now, most cryptography implementations on parallel architectures have focused on adapting the software to SIMD architectures initially meant for media applications. In this ...
Jacques J. A. Fournier, Simon W. Moore
PERCOM
2007
ACM
14 years 7 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
DSN
2000
IEEE
14 years 2 days ago
DEEM: A Tool for the Dependability Modeling and Evaluation of Multiple Phased Systems
Multiple-Phased Systems, whose operational life can be partitioned in a set of disjoint periods, called “phases”, include several classes of systems such as Phased Mission Sys...
Andrea Bondavalli, Ivan Mura, Silvano Chiaradonna,...
ICCSA
2004
Springer
14 years 1 months ago
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System
Peer-to-Peer (P2P) computing is said to be the next wave of computing after client-server and web-based computing. It provides an opportunity to harness a lot of idle peer-resource...
Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, F...
CORR
2004
Springer
117views Education» more  CORR 2004»
13 years 7 months ago
Efficient dot product over word-size finite fields
We want to achieve efficiency for the exact computation of the dot product of two vectors over word size finite fields. We therefore compare the practical behaviors of a wide range...
Jean-Guillaume Dumas