|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 49 occurrences of 35 keywords
|
|
|
Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Ranjan Chaudhuri |
Teaching bit-level algorithm analysis to the undergraduates in computer science. |
ACM SIGCSE Bull. |
2004 |
DBLP DOI BibTeX RDF |
bit-level, bit-size, algorithms, complexity, run-time |
19 | Ilan Adler, Peter A. Beling |
Polynomial Algorithms for LP over a Subring of the Algebraic Integers with Applications to LP with Circulant Matrices |
FOCS |
1991 |
DBLP DOI BibTeX RDF |
algebraic integers, subring, encoding size, bit size, Tardos scheme, strongly polynomial time, linear programming, interior point method, square roots, running time, polynomial algorithms, real numbers, circulant matrices |
17 | Saleh Abdel-Hafeez, Shadi M. Harb, William R. Eisenstadt |
High speed digital CMOS divide-by-N fequency divider. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Maria M. Davis, Dávid Papp |
Rational dual certificates for weighted sums-of-squares polynomials with boundable bit size. |
J. Symb. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mykhailo Kasianchuk, Ihor Yakymenko, Vasyl Yatskiv, Stepan Ivasiev, Andriy Sverstiuk |
Same Bit-Size Moduli Formation of Residue Number System for Application in Asymmetric Cryptography. |
IntelITSIS |
2021 |
DBLP BibTeX RDF |
|
13 | Xavier Dahan |
On the bit-size of non-radical triangular sets. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
13 | Xavier Dahan |
On the Bit-Size of Non-radical Triangular Sets. |
MACIS |
2017 |
DBLP DOI BibTeX RDF |
|
13 | Tetsuro Yamashita, Xavier Dahan |
Bit-size reduction of triangular sets in two and three variables. |
SCSS |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Xavier Dahan, Abdulilah Kadri, Éric Schost |
Bit-size estimates for triangular sets in positive dimension. |
J. Complex. |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Xavier Dahan, Abdulilah Kadri, Éric Schost |
Bit-size estimates for triangular sets in positive dimension |
CoRR |
2010 |
DBLP BibTeX RDF |
|
13 | Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim |
A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Fatima Boudaoud, Fabrizio Caruso, Marie-Françoise Roy |
Certificates of Positivity in the Bernstein Basis. |
Discret. Comput. Geom. |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Alin Bostan, Frédéric Chyzak, Bruno Salvy, Thomas Cluzeau |
Low complexity algorithms for linear recurrences. |
ISSAC |
2006 |
DBLP DOI BibTeX RDF |
creative telescoping, polynomial and rational solutions, summation, complexity, computer algebra, linear recurrences |
13 | Alin Bostan, Thomas Cluzeau, Bruno Salvy |
Fast algorithms for polynomial solutions of linear differential equations. |
ISSAC |
2005 |
DBLP DOI BibTeX RDF |
complexity, computer algebra, linear recurrences, linear differential equations, polynomial solutions |
11 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
11 | GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee 0001 |
A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. |
ICOIN |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems |
10 | Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke |
SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
GNFS, lattice sieving, RSA 1024 bit, Integer factorization, special hardware |
7 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. |
FPGA |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
7 | Peter Lory |
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
7 | Guillaume Moroz |
Complexity of the resolution of parametric systems of polynomial equations and inequations. |
ISSAC |
2006 |
DBLP DOI BibTeX RDF |
discriminant variety, parametric polynomial system, complexity, elimination |
6 | Gopal Lakhani |
Image Fitting Using arctan for JPEG AC Coefficient Prediction. |
IEEE Trans. Circuits Syst. Video Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Alex Panato, Marcelo Barcelos, Ricardo Augusto da Luz Reis |
A Low Device Occupation IP to Implement Rijndael Algorithm. |
DATE |
2003 |
DBLP DOI BibTeX RDF |
|
6 | François Grieu |
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
4 | Cyril Gavoille, Adrian Kosowski, Marcin Markiewicz |
What Can Be Observed Locally? |
DISC |
2009 |
DBLP DOI BibTeX RDF |
|
4 | Abderrahmane Nitaj |
Cryptanalysis of RSA Using the Ratio of the Primes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Coppersmith’s Method, Cryptanalysis, RSA, Factorization, Continued Fraction |
4 | Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsigaridas |
Real Algebraic Numbers: Complexity Analysis and Experimentation. |
Reliable Implementation of Real Number Algorithms |
2008 |
DBLP DOI BibTeX RDF |
|
4 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
4 | Dieaa I. Nassr, Hatem M. Bahig, Ashraf Bhery, Sameh S. Daoud |
A new RSA vulnerability using continued fractions. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
4 | Tim Güneysu, Christof Paar |
Ultra High Performance ECC over NIST Primes on Commercial FPGAs. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
FPGA, High-Performance, Elliptic Curve Cryptosystems |
4 | Ben Adida, Douglas Wikström |
Offline/Online Mixing. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
|
4 | Kisub Lee, Hyoungjoon Kim, Byoungjo Choi, Joonghwee Cho |
An Implementation of H.264 Intra Predictor Based on Sub-sampling. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
4 | Douglas Wikström |
On the l-Ary GCD-Algorithm in Rings of Integers. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
4 | Sebastiano Battiato, Camillo Bosco, Arcangelo Bruna, Gianpiero di Blasi, Giovanni Gallo |
Statistical Modeling of Huffman Tables Coding. |
ICIAP |
2005 |
DBLP DOI BibTeX RDF |
|
4 | Alexander May 0001 |
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
Coppersmiths method, RSA |
4 | László Babai |
Deciding Finiteness of Matrix Groups in Las Vegas Polynomial Time. |
SODA |
1992 |
DBLP BibTeX RDF |
|
Displaying result #1 - #36 of 36 (100 per page; Change: )
|
|