Sciweavers

22193 search results - page 53 / 4439
» Multiple Restricted Multiplication
Sort
View
124
Voted
CHES
2010
Springer
183views Cryptology» more  CHES 2010»
15 years 2 months ago
Coordinate Blinding over Large Prime Fields
In this paper we propose a multiplicative blinding scheme for protecting implementations of a scalar multiplication over elliptic curves. Specifically, this blinding method applies...
Michael Tunstall, Marc Joye
NIPS
2000
15 years 3 months ago
Balancing Multiple Sources of Reward in Reinforcement Learning
For many problems which would be natural for reinforcement learning, the reward signal is not a single scalar value but has multiple scalar components. Examples of such problems i...
Christian R. Shelton
AAECC
2000
Springer
81views Algorithms» more  AAECC 2000»
15 years 2 months ago
On Short Multiplications and Divisions
Computing only the low degree terms of the product of two univariate polynomials is called a short multiplication. By decomposition into subproblems, a short multiplication can be ...
Thom Mulders
ARITH
2007
IEEE
15 years 8 months ago
Fast Modular Reduction
It is widely acknowledged that efficient modular multiplication is a key to high-performance implementation of public-key cryptography, be it classical RSA, Diffie-Hellman, or (hy...
William Hasenplaugh, Gunnar Gaubatz, Vinodh Gopal
ICC
2007
IEEE
15 years 8 months ago
New UWB Receiver Designs Based on a Gaussian-Laplacian Noise-Plus-MAI Model
—Two novel receiver structures which surpass the performance of the conventional matched filter receiver are proposed for ultra-wide bandwidth multiple access communications. Th...
Norman C. Beaulieu, Somasundaram Niranjayan