Sciweavers

1816 search results - page 27 / 364
» Trace oblivious computation
Sort
View
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
12 years 9 months ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 9 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
RT
2000
Springer
14 years 1 months ago
Ray Tracing Point Sampled Geometry
We present a novel technique for ray tracing geometry represented by points. Our approach makes it possible to render high quality ray traced images with global illumination using ...
Gernot Schaufler, Henrik Wann Jensen
STACS
2010
Springer
14 years 4 months ago
Ultimate Traces of Cellular Automata
A cellular automaton (CA) is a parallel synchronous computing model, which consists in a juxtaposition of finite automata (cells) whose state evolves according to that of their ne...
Julien Cervelle, Enrico Formenti, Pierre Guillon
DAC
1999
ACM
14 years 10 months ago
Performance-Driven Integration of Retiming and Resynthesis
Abstract We present a novel approach to performance optimization by integrating retiming and resynthesis. The approach is oblivious of register boundaries during resynthesis. In ad...
Peichen Pan