Sciweavers

22193 search results - page 77 / 4439
» Multiple Restricted Multiplication
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 8 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
113
Voted
CHES
2003
Springer
119views Cryptology» more  CHES 2003»
15 years 7 months ago
Faster Double-Size Modular Multiplication from Euclidean Multipliers
Abstract. A novel technique for computing a 2n-bit modular multiplication using n-bit arithmetic was introduced at CHES 2002 by Fischer and Seifert. Their technique makes use of an...
Benoît Chevallier-Mames, Marc Joye, Pascal P...
AES
2000
Springer
105views Cryptology» more  AES 2000»
15 years 6 months ago
The Effects of Multiple Algorithms in the Advanced Encryption Standard
This paper presents a discussion of the issues relating to the selection of encryption algorithms in practical situations. An AES standard which recommends multiple algorithms in ...
Ian Harvey
ISCAS
1999
IEEE
106views Hardware» more  ISCAS 1999»
15 years 6 months ago
A low power scheduling scheme with resources operating at multiple voltages
This paper presents resource and latency constrained scheduling algorithms to minimize power/energy consumption when the resources operate at multiple voltages (5 V, 3.3 V,
Ali Manzak, Chaitali Chakrabarti
EUROPAR
1997
Springer
15 years 6 months ago
Using the Parallel Karatsuba Algorithm for Long Integer Multiplication and Division
We experiment with sequential and parallel versions of the Karatsuba multiplication algorithm implemented under the paclib computer algebra system on a Sequent Symmetry shared-memo...
Tudor Jebelean