Sciweavers

861 search results - page 129 / 173
» Faster integer multiplication
Sort
View
EUROPKI
2004
Springer
14 years 2 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 2 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
PAKDD
2004
ACM
137views Data Mining» more  PAKDD 2004»
14 years 2 months ago
Fast and Light Boosting for Adaptive Mining of Data Streams
Supporting continuous mining queries on data streams requires algorithms that (i) are fast, (ii) make light demands on memory resources, and (iii) are easily to adapt to concept dr...
Fang Chu, Carlo Zaniolo
ROBOCUP
2004
Springer
86views Robotics» more  ROBOCUP 2004»
14 years 2 months ago
A Method of Pseudo Stereo Vision from Images of Cameras Shutter Timing Adjusted
Multiple cameras have been used to get a view of a large area. In some cases, the cameras are placed so that their views are overlapped to get a more complete view. 3D information ...
Hironobu Fujiyoshi, Shoichi Shimizu, Yasunori Naga...
DATE
2003
IEEE
134views Hardware» more  DATE 2003»
14 years 2 months ago
A Multi-Level Design Flow for Incorporating IP Cores: Case Study of 1D Wavelet IP Integration
The design of high performance multimedia systems in a short time force us to use IP's blocks in many designs. However, their correct integration in a design implies more com...
Adel Baganne, Imed Bennour, Mehrez Elmarzougui, Ri...