|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 685 occurrences of 482 keywords
|
|
|
Results
Found 878 publication records. Showing 878 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
85 | Behrooz Parhami |
Tight Upper Bounds on the Minimum Precision Required of the Divisor and the Partial Remainder in High-Radix Division. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
digit-selector PLA, high-radix division, p-d plot, quotient digit selection, SRT division, Digit-recurrence division |
67 | Christopher Thorpe, David C. Parkes |
Cryptographic Combinatorial Securities Exchanges. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Xiaohong Jiang 0001, Susumu Horiguchi, Yue Hao |
Predicting the Yield Efficacy of a Defect-Tolerant Embedded Core. |
DFT |
2000 |
DBLP DOI BibTeX RDF |
|
64 | Werner Schindler |
A Timing Attack against RSA with the Chinese Remainder Theorem. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack |
54 | Jie Zhou, Yong-hao Ou |
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Group Key Distribution Scheme, Key tree, Group member subtree, root ID algorithm, Chinese Remainder Theorem |
54 | Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 |
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder |
53 | Jen-Ho Yang, Chin-Chen Chang 0001 |
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Aryabhata Remainder Theorem, Information Protection Systems, Chinese Remainder Theorem |
48 | Peter Kornerup |
Digit Selection for SRT Division and Square Root. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
Digit selection, division, square root |
48 | Peter Kornerup |
Revisiting SRT Quotient Digit Selection. |
IEEE Symposium on Computer Arithmetic |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Kamer Kaya, Ali Aydin Selçuk |
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability |
45 | Kamer Kaya, Ali Aydin Selçuk |
Robust Threshold Schemes Based on the Chinese Remainder Theorem. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal |
45 | Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews |
Chinese remainder theorem based group key management. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management |
45 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
38 | Fumiaki Sato, Sumito Iijima |
Battery and Power Aware Routing in Mobile Ad Hoc Networks. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
battery aware routing, Ad hoc networks, dynamic source routing, power aware routing |
38 | Xin Liu, Qionghai Dai, Qiufeng Wu |
An Improved Resource Reservation Algorithm for IEEE 802.15.3. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
38 | David W. Matula, Alex Fit-Florea |
Prescaled Integer Division. |
IEEE Symposium on Computer Arithmetic |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Yu-Chen Kuo, Chih-Nung Chen |
CRT-MAC: A Power-Saving Multicast Protocol in the Asynchronous Ad Hoc Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
Ad hoc network, Multicast, Chinese Remainder Theorem, Power-Saving |
37 | Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon |
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis |
37 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
37 | Evelyne Hubert |
Improvements to a triangulation-decomposition algorithm for ordinary differential systems in higher degree cases. |
ISSAC |
2004 |
DBLP DOI BibTeX RDF |
differential elimination, differential ideal theory, subresultant polynomial remainder sequence, systems of differential equations, triangular sets |
37 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
37 | Wieland Fischer, Jean-Pierre Seifert |
Note on Fast Computation of Secret RSA Exponents. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation |
37 | Yuh-Shyan Chen, Yun-Wei Lin |
C-MAC: An Energy-Efficient MAC Scheme Using Chinese-Remainder-Theorem for Wireless Sensor Networks. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Chuan-Kun Wu, Vijay Varadharajan |
Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
37 | Chih-Ming Su, Shian-Shyong Tseng, Mon-Fong Jiang, Joe C. S. Chen |
A Fast Clustering Process for Outliers and Remainder Clusters. |
PAKDD |
1999 |
DBLP DOI BibTeX RDF |
|
37 | Martin Berz, Georg Hoffstätter |
Computation and Application of Taylor Polynomials with Interval Remainder Bounds. |
Reliab. Comput. |
1998 |
DBLP DOI BibTeX RDF |
|
35 | Xuting Wan, Jianping Cai, Qifan Yang |
Remainder Sign Analysis in Fixed-point Division. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
true code, addition and subtraction alternating, remainder sign, division, complement |
35 | Hung-Min Sun, Shih-Ying Chang, Yu-Hsiang Hung, Yu-Kai Tseng, Hsin-Ta Chiao |
Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem. |
ISPAN |
2009 |
DBLP DOI BibTeX RDF |
forward error correction, Chinese remainder theorem, reliable multicast |
35 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
35 | Venkatesan Guruswami, Amit Sahai, Madhu Sudan 0001 |
"Soft-decision" Decoding of Chinese Remainder Codes. |
FOCS |
2000 |
DBLP DOI BibTeX RDF |
Chinese remainder codes, prime integers, message space, agreement parameter, error-correcting algorithms, encoding, encoding, decoding, list decoding, soft-decision decoding |
35 | Hanshen Xiao, Yufeng Huang, Yu Ye 0001, Guoqiang Xiao 0001 |
Robustness in Chinese Remainder Theorem for Multiple Numbers and Remainder Coding. |
IEEE Trans. Signal Process. |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Cheng Chen 0010, Sian-Jheng Lin, Yunghsiang S. Han |
Extended Versions of Polynomial Remainder Codes and Chinese Remainder Codes. |
IEEE Commun. Lett. |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Li Xiao 0002, Xiang-Gen Xia 0001 |
Error Correction in Polynomial Remainder Codes with Non-Pairwise Coprime Moduli and Robust Chinese Remainder Theorem for Polynomials. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
35 | Li Xiao 0002, Xiang-Gen Xia 0001 |
Error Correction in Polynomial Remainder Codes With Non-Pairwise Coprime Moduli and Robust Chinese Remainder Theorem for Polynomials. |
IEEE Trans. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Guangwu Xu |
On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
35 | Xiaoping Li 0002, Wenjie Wang 0001, Wei Wang 0052, Xiao-Li Ding, Qinye Yin 0001 |
Optimal estimates of common remainder for the robust Chinese Remainder Theorem. |
Commun. Nonlinear Sci. Numer. Simul. |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Piso Fernandez, Javier D. Bruguera |
A New Rounding Algorithm for Variable Latency Division and Square Root Implementations. |
DSD |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Abdelhamid S. Abdelhamid, Ahmed A. Belal |
Secure transmission of sensitive data using multiple channels. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
29 | Marc Girault, Jean-François Misarsky |
Selective Forgery of RSA Signatures Using Redundancy. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
29 | J. Arjun Prabhu, Gregory B. Zyner |
167 MHz Radix-8 Divide and Square Root Using Overlapped Radix-2 Stages. |
IEEE Symposium on Computer Arithmetic |
1995 |
DBLP DOI BibTeX RDF |
|
29 | W. Neuhaus, S. Schottlaender |
Die Weiterentwicklung der Aireyschen Konvergenzfaktoren für das Exponentialintegral zu einer Darstellung mit Restglied. |
Computing |
1975 |
DBLP DOI BibTeX RDF |
|
29 | E. M. Boehm, Thomas B. Steel Jr. |
The Share 709 System: Machine Implementation of Symbolic Programming. |
J. ACM |
1959 |
DBLP DOI BibTeX RDF |
|
27 | Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai |
Weighted Threshold Secret Image Sharing. |
PSIVT |
2009 |
DBLP DOI BibTeX RDF |
Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing |
27 | Baodong Qin, Ming Li, Fanyu Kong |
Cryptanalysis of a Type of CRT-Based RSA Algorithms. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL |
27 | Tiancheng Lou, Christophe Tartary |
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate |
27 | Murat Cenk, Ferruh Özbudak |
Efficient Multiplication in F3kn, m>=1 and 5<=l<=18. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Chinese Remainder Theorem, pairing based cryptography, finite field multiplication |
27 | Arnaud Boscher, Robert Naciri, Emmanuel Prouff |
CRT RSA Algorithm Protected Against Fault Attacks. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation |
27 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
27 | Xukai Zou, Amandeep Thukral, Byrav Ramamurthy |
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Mobile ad hoc networks, Network security, Key management, Chinese remainder theorem, Secure group communication |
27 | Sining Liu, Brian King, Wei Wang 0003 |
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
algorithm, smart card, RSA, Chinese Remainder Theorem |
27 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
27 | Alec Chi-Wah Wong, Yu-Kwong Kwok |
On a Region-of-Interest Based Approach to Robust Wireless Video Transmission. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
remainder (RM), channel adaptation, real-time video compression, JPEG2000 (wavelet), simulations, network measurements, region of interest (ROI), PSNR, H.263 (DCT) |
27 | Jiann-Cherng Shieh |
An efficient accessing technique for Taiwanese phonetic transcriptions. |
ACM Trans. Asian Lang. Inf. Process. |
2003 |
DBLP DOI BibTeX RDF |
Hashing function design, Taiwanese phonetic transcriptions, minimal perfect hashing function, Chinese remainder theorem |
27 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
A new CRT-RSA algorithm secure against bellcore attacks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack |
27 | Vyacheslav M. Abramov |
Asymptotic Analysis of the GI/M/1/n Loss System as n Increases to Infinity. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
loss system, GI/M/1/n queue, Tauberian theorems with remainder, asymptotic analysis |
27 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
27 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
27 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
27 | Lejla Batina, Geeke Muurling |
Another Way of Doing RSA Cryptography in Hardware. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation |
27 | Hirofumi Muratani |
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack |
27 | Chin-Chen Chang 0001, Tung-Shou Chen, Yi Lin |
An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. |
IRAL |
2000 |
DBLP DOI BibTeX RDF |
Boshiamy, Chinese input, Chinese remainder theorem, perfect hashing |
27 | Maria Luisa Bonet, Toniann Pitassi, Ran Raz |
No Feasible Interpolation for TC0-Frege Proofs. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
TC/sup 0/-Frege proofs, feasible interpolation, complexity-theoretic assumption, hardness assumption, lower bounds, theorem proving, Chinese Remainder Theorem, proof systems |
27 | Vassilis Paliouras, Thanos Stouraitis |
Area-time performance of VLSI FIR filter architectures based on residue arithmetic. |
EUROMICRO |
1997 |
DBLP DOI BibTeX RDF |
area-time performance optimization, VLSI FIR filter architectures, FIR processors, moduli bases, binary-to-residue conversion complexity, residue-to-binary conversion complexity, multiply-by-constant units, binary structures, performance models, Chinese remainder theorem, residue number system, FIR filters, residue arithmetic |
27 | Patrick Fitzpatrick, Graham H. Norton |
The Berlekamp-Massey algorithm and linear recurring sequences over a factorial domain. |
Appl. Algebra Eng. Commun. Comput. |
1995 |
DBLP DOI BibTeX RDF |
Polynomial remainder sequence, linear recurring sequence, factorial domain, Berlekamp-Massey algorithm |
27 | Tzonelih Hwang |
Cryptosystem for Group Oriented Cryptography. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography |
27 | Guang-Huei Chiou, Wen-Tsuen Chen |
Secure Broadcasting Using the Secure Lock. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
secure broadcasting protocols, secret key minimization, secure broadcasting, secure lock, deciphering operation, private-key cryptosystem, cryptography, protocols, broadcasting, public-key cryptosystem, Chinese Remainder theorem, satellite, telecommunication channels, session key, radio, broadcast channels, secret keys, ciphertext |
27 | Murat Cenk, Ferruh Özbudak |
Improved Polynomial Multiplication Formulas over $IF2$ Using Chinese Remainder Theorem. |
IEEE Trans. Computers |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Shaoqiang Bi, Warren J. Gross |
The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shreyas Sundaram, Christoforos N. Hadjicostis |
Fault-Tolerant Convolution Via Chinese Remainder Codes Constructed From Non-Coprime Moduli. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Wen Tao Zhu |
General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo |
On the Use of Chinese Remainder Theorem for Energy Saving in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shyong Jian Shyu, Ying-Ru Chen |
Threshold Secret Image Sharing by Chinese Remainder Theorem. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Huiyong Liao, Xiang-Gen Xia 0001 |
A Sharpened Dynamic Range of a Generalized Chinese Remainder Theorem for Multiple Integers. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sorin Iftene, Manuela Grindei |
Weighted Threshold RSA Based on the Chinese Remainder Theorem. |
SYNASC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Akira Terui |
Recursive Polynomial Remainder Sequence and the Nested Subresultants. |
CASC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michaël Quisquater, Bart Preneel, Joos Vandewalle |
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu |
RSA cryptosystem design based on the Chinese remainder theorem. |
ASP-DAC |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras |
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Yuke Wang, Xiaoyu Song, El Mostapha Aboulhamid |
A New Algorithm for RNS Magnitude Comparison Based on New Chinese Remainder Theorem II. |
Great Lakes Symposium on VLSI |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Hantao Zhang 0001, Xin Hua |
Proving the Chinese Remainder Theorem by the Cover Set Induction. |
CADE |
1992 |
DBLP DOI BibTeX RDF |
|
27 | Victor Y. Pan, Elliott Landowne, Akimou Sadikou |
Univariate polynomial division with a remainder by means of evaluation and interpolation. |
SPDP |
1991 |
DBLP DOI BibTeX RDF |
|
27 | Michael Kalkbrener |
Solving Systems of Bivariate Algebraic Equations by Using Primitive Polynomial Remainder Sequences. |
ISSAC |
1990 |
DBLP DOI BibTeX RDF |
|
27 | James R. Pinkert |
Very fast computation of polynomial remainder sequence coefficient signs. |
AFIPS National Computer Conference |
1976 |
DBLP DOI BibTeX RDF |
|
27 | George E. Collins |
Subresultants and Reduced Polynomial Remainder Sequences. |
J. ACM |
1967 |
DBLP DOI BibTeX RDF |
|
19 | Tuan-Che Chen, Jyh-Cheng Chen, Ying-Yu Chen |
Maximizing Unavailability Interval for Energy Saving in IEEE 802.16e Wireless MANs. |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
low-end device, double-size technique, RSA, modular multiplication, efficient implementation, crypto-coprocessors, arithmetic unit |
19 | Tuan-Che Chen, Ying-Yu Chen, Jyh-Cheng Chen |
An efficient energy saving mechanism for IEEE 802.16e wireless MANs. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Oleg Kiselyov, William E. Byrd, Daniel P. Friedman, Chung-chieh Shan |
Pure, Declarative, and Constructive Arithmetic Relations (Declarative Pearl). |
FLOPS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Jeong-Chun Joo, Hae-Yeoun Lee, Cong Nguyen Bui, Won-Young Yoo, Heung-Kyu Lee |
Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function. |
PCM |
2008 |
DBLP DOI BibTeX RDF |
Pixel-value differencing, Modulus function, Steganography, Steganalysis |
19 | Xiaofeng Mi, Douglas DeCarlo |
Separating Parts from 2D Shapes using Relatability. |
ICCV |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Xiao Yan Deng, Greg Michaelson, Philip W. Trinder |
Automatically Costed Autonomous Mobility. |
IAT |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Álvaro Vázquez, Elisardo Antelo, Paolo Montuschi |
A radix-10 SRT divider based on alternative BCD codings. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Young-Bin Kwon, Jeong-Hoon Kim |
Verification of the Document Components from Dual Extraction of MRTD Information. |
GREC |
2007 |
DBLP DOI BibTeX RDF |
MRTD(Machine Readable Travel Document), cross-check, auto-correlation, verification, passport |
19 | Shuliang Wang, Xinzhou Wang |
A Fuzzy Comprehensive Clustering Method. |
ADMA |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mehdi Hakimi, Seyyed Masoud Moghaddas Tafreshi, M. R. Rajati |
Unit Sizing of a Stand-Alone Hybrid Power System Using Model-Free Optimization. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
reformer, hybrid power system, optimal sizing, particle swarm optimization I. NOMENCLATURE P conv wg - Power delivered from wind turbines to converter (kw) P el wg - Power delivered from wind turbines to electrolyzer (kw) P k el tan - Power delive, K. N. Toosi University of Technology, Tehran-Iran (e-mail: sm_hakimi@yahoo.com). S.M.M.Tafreshi is with the Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran-Iran (e-mail: tafreshi@eetd.kntu.ac.ir). M. R. Rajati is with the Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran-Iran (e-mail: mohammadreza.rajati@gmail.com). P wt Power generated by wind turbines (kw) Pload Load power (kw) E k tan Stored energy in the hydrogen tank (kwh) fc, el, conv Efficiency of fuel cell, electrolyzer, converter NPCindex Net present cost (the index shows the corresponding component) ($) S Single-payment present worth factor R Life time of project (year) L Life time of each components (year) Ir Inter, fuel cell, wind turbine |
19 | Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim |
Fast Decimal Floating-Point Division. |
IEEE Trans. Very Large Scale Integr. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien |
Parallel Montgomery Multiplication in GF(2k) Using Trinomial Residue Arithmetic. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Tae Jong Kim, Young-Bin Kwon |
Crosscheck of Passport Information for Personal Identification. |
GREC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Hans-Jürgen Dobner |
Kernel-Splitting Technique for Enclosing the Solution of Fredholm Equations of the First Kind. |
Reliab. Comput. |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 878 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|