The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase bit-size (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-2006 (15) 2007-2010 (15) 2012-2024 (6)
Publication types (Num. hits)
article(7) inproceedings(29)
Venues (Conferences, Journals, ...)
ISSAC(3) CHES(2) CoRR(2) ICALP(2) ACM SIGCSE Bull.(1) ACNS(1) AFRICACRYPT(1) AICCSA(1) AINA Workshops (1)(1) APCCAS(1) CRYPTO(1) DATE(1) DISC(1) Discret. Comput. Geom.(1) EUROCRYPT(1) FOCS(1) More (+10 of total 31)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 49 occurrences of 35 keywords

Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Ranjan Chaudhuri Teaching bit-level algorithm analysis to the undergraduates in computer science. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF bit-level, bit-size, algorithms, complexity, run-time
19Ilan Adler, Peter A. Beling Polynomial Algorithms for LP over a Subring of the Algebraic Integers with Applications to LP with Circulant Matrices Search on Bibsonomy FOCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF algebraic integers, subring, encoding size, bit size, Tardos scheme, strongly polynomial time, linear programming, interior point method, square roots, running time, polynomial algorithms, real numbers, circulant matrices
17Saleh Abdel-Hafeez, Shadi M. Harb, William R. Eisenstadt High speed digital CMOS divide-by-N fequency divider. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Maria M. Davis, Dávid Papp Rational dual certificates for weighted sums-of-squares polynomials with boundable bit size. Search on Bibsonomy J. Symb. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Mykhailo Kasianchuk, Ihor Yakymenko, Vasyl Yatskiv, Stepan Ivasiev, Andriy Sverstiuk Same Bit-Size Moduli Formation of Residue Number System for Application in Asymmetric Cryptography. Search on Bibsonomy IntelITSIS The full citation details ... 2021 DBLP  BibTeX  RDF
13Xavier Dahan On the bit-size of non-radical triangular sets. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
13Xavier Dahan On the Bit-Size of Non-radical Triangular Sets. Search on Bibsonomy MACIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
13Tetsuro Yamashita, Xavier Dahan Bit-size reduction of triangular sets in two and three variables. Search on Bibsonomy SCSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
13Xavier Dahan, Abdulilah Kadri, Éric Schost Bit-size estimates for triangular sets in positive dimension. Search on Bibsonomy J. Complex. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
13Xavier Dahan, Abdulilah Kadri, Éric Schost Bit-size estimates for triangular sets in positive dimension Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
13Soon-Dong Kim, Man-Pyo Hong, Dong-Kyoo Kim A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End Host. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Fatima Boudaoud, Fabrizio Caruso, Marie-Françoise Roy Certificates of Positivity in the Bernstein Basis. Search on Bibsonomy Discret. Comput. Geom. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Alin Bostan, Frédéric Chyzak, Bruno Salvy, Thomas Cluzeau Low complexity algorithms for linear recurrences. Search on Bibsonomy ISSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF creative telescoping, polynomial and rational solutions, summation, complexity, computer algebra, linear recurrences
13Alin Bostan, Thomas Cluzeau, Bruno Salvy Fast algorithms for polynomial solutions of linear differential equations. Search on Bibsonomy ISSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF complexity, computer algebra, linear recurrences, linear differential equations, polynomial solutions
11Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
11GangShin Lee, Heeran Lim, Manpyo Hong, Dong Hoon Lee 0001 A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems
10Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF GNFS, lattice sieving, RSA 1024 bit, Integer factorization, special hardware
7Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
7Peter Lory Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
7Guillaume Moroz Complexity of the resolution of parametric systems of polynomial equations and inequations. Search on Bibsonomy ISSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF discriminant variety, parametric polynomial system, complexity, elimination
6Gopal Lakhani Image Fitting Using arctan for JPEG AC Coefficient Prediction. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Alex Panato, Marcelo Barcelos, Ricardo Augusto da Luz Reis A Low Device Occupation IP to Implement Rijndael Algorithm. Search on Bibsonomy DATE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
6François Grieu A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
4Cyril Gavoille, Adrian Kosowski, Marcin Markiewicz What Can Be Observed Locally? Search on Bibsonomy DISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
4Abderrahmane Nitaj Cryptanalysis of RSA Using the Ratio of the Primes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s Method, Cryptanalysis, RSA, Factorization, Continued Fraction
4Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsigaridas Real Algebraic Numbers: Complexity Analysis and Experimentation. Search on Bibsonomy Reliable Implementation of Real Number Algorithms The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
4Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or
4Dieaa I. Nassr, Hatem M. Bahig, Ashraf Bhery, Sameh S. Daoud A new RSA vulnerability using continued fractions. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
4Tim Güneysu, Christof Paar Ultra High Performance ECC over NIST Primes on Commercial FPGAs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, High-Performance, Elliptic Curve Cryptosystems
4Ben Adida, Douglas Wikström Offline/Online Mixing. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
4Kisub Lee, Hyoungjoon Kim, Byoungjo Choi, Joonghwee Cho An Implementation of H.264 Intra Predictor Based on Sub-sampling. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
4Douglas Wikström On the l-Ary GCD-Algorithm in Rings of Integers. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
4Sebastiano Battiato, Camillo Bosco, Arcangelo Bruna, Gianpiero di Blasi, Giovanni Gallo Statistical Modeling of Huffman Tables Coding. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
4Alexander May 0001 Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Coppersmiths method, RSA
4László Babai Deciding Finiteness of Matrix Groups in Las Vegas Polynomial Time. Search on Bibsonomy SODA The full citation details ... 1992 DBLP  BibTeX  RDF
Displaying result #1 - #36 of 36 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license