Sciweavers

532 search results - page 12 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
IACR
2011
122views more  IACR 2011»
12 years 7 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
SYNASC
2005
IEEE
117views Algorithms» more  SYNASC 2005»
14 years 1 months ago
Functional-Based Synthesis of Systolic Online Multipliers
— Systolic online algorithms for the multiplication of univariate polynomials and of multiple precision integers are synthesised using a novel method based on the following funct...
Tudor Jebelean, Laura Szakacs
INFOCOM
2010
IEEE
13 years 6 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
FMICS
2008
Springer
13 years 9 months ago
Extending Structural Test Coverage Criteria for Lustre Programs with Multi-clock Operators
Lustre is a formal synchronous declarative language widely used for modeling and specifying safety-critical applications in the elds of avionics, transportation or energy productio...
Virginia Papailiopoulou, Laya Madani, Lydie du Bou...
ICPR
2000
IEEE
13 years 12 months ago
3-D Object Reconstruction Using Spatially Extended Voxels and Multi-Hypothesis Voxel Coloring
In this paper we describe a voxel-based 3-D reconstruction technique from multiple calibrated camera views that makes explicit use of the finite size footprint of a voxel when pr...
Eckehard G. Steinbach, Bernd Girod, Peter Eisert, ...