Sciweavers

560 search results - page 43 / 112
» Multiplication by a Constant is Sublinear
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
Performance of Opportunistic Spectrum OFDMA Network with Users of Different Priorities and Traffic Characteristics
We propose an analytical model to assess the throughput and connection blocking rate of Opportunistic Spectrum Orthogonal Frequency Division Multiple Access network constituted of ...
Jihoon Park, Przemyslaw Pawelczak, Pål Gr&os...
CRYPTO
2001
Springer
95views Cryptology» more  CRYPTO 2001»
14 years 17 days ago
Robustness for Free in Unconditional Multi-party Computation
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Martin Hirt, Ueli M. Maurer
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
14 years 12 days ago
Montgomery Exponentiation with no Final Subtractions: Improved Results
The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With the advent of new classes of attacks (timing attacks, power...
Gaël Hachez, Jean-Jacques Quisquater
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Simultaneous Modular Reduction and Kronecker Substitution for Small Finite Fields
We present algorithms to perform modular polynomial multiplication or modular dot product efficiently in a single machine word. We pack polynomials into integers and perform sever...
Jean-Guillaume Dumas, Laurent Fousse, Bruno Salvy
ASAP
2006
IEEE
130views Hardware» more  ASAP 2006»
14 years 2 months ago
Cross Layer Design to Multi-thread a Data-Pipelining Application on a Multi-processor on Chip
Data-Pipelining is a widely used model to represent streaming applications. Incremental decomposition and optimization of a data-pipelining application onto a multi-processor plat...
Bo-Cheng Charles Lai, Patrick Schaumont, Wei Qin, ...