Sciweavers

694 search results - page 8 / 139
» The Power of the Middle Bit
Sort
View
ISLPED
1998
ACM
72views Hardware» more  ISLPED 1998»
13 years 11 months ago
Power invariant vector compaction based on bit clustering and temporal partitioning
Nicola Dragone, Roberto Zafalon, Carlo Guardiani, ...
WCNC
2010
IEEE
13 years 6 months ago
One-Bit Feedback Selection Schemes for Power-Efficient Multiuser and Multirelay Systems
Viet-Anh Le, Taneli Riihonen, Risto Wichman, Steve...
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
13 years 12 months ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
IJNSEC
2006
61views more  IJNSEC 2006»
13 years 7 months ago
Is There a Shortage of Primes for Cryptography?
Cryptographic algorithms often prescribe the use of primes whose length in bits is a power of 2. Recently, we proved that for m > 1, there is no prime number with 2m significan...
Samuel S. Wagstaff Jr.