Sciweavers

275 search results - page 7 / 55
» The double CFTP method
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 3 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ISCAS
2007
IEEE
109views Hardware» more  ISCAS 2007»
14 years 3 months ago
Energy-Efficient Double-Binary Tail-Biting Turbo Decoder Based on Border Metric Encoding
—This paper presents an energy-efficient turbo decoder based on border metric encoding, which is especially suitable for non-binary circular turbo codes. In the proposed method, ...
Ji-Hoon Kim, In-Cheol Park
ACL2
2006
ACM
14 years 3 months ago
Double rewriting for equivalential reasoning in ACL2
Several users have had problems using equivalence-based rewriting in ACL2 because the ACL2 rewriter caches its results. We describe this problem in some detail, together with a pa...
Matt Kaufmann, J. Strother Moore
CIG
2005
IEEE
14 years 2 months ago
On TRACS: Dealing with a Deck of Double-Sided Cards
TRACS (Tool for Research on Adaptive Cognitive Strategies) is a new suite of card games played with a special deck, where the back of each card is a clue to the front of the card. ...
Kevin Burns
CORR
2007
Springer
104views Education» more  CORR 2007»
13 years 9 months ago
Double Clustering and Graph Navigability
Graphs are called navigable if one can find short paths through them using only local knowledge. It has been shown that for a graph to be navigable, its construction needs to mee...
Oskar Sandberg