• No results found

Pre-computation

On  the  Optimal  Pre-Computation  of  Window $\tau$NAF  for  Koblitz  Curves

On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves

... Finally, we turn to the other operation, the Frobenius map τ . Concerning the efficiency of using τ in pre-computation, there has not been a clean argument yet. As mentioned earlier, the example in [13] ...

14

OPAQUE:  An  Asymmetric  PAKE  Protocol  Secure  Against  Pre-Computation  Attacks

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks

... for pre-computation attacks that lead to the instantaneous compromise of user passwords upon server compromise, thus forgoing much of the intended aPAKE ...to pre-computation ...

61

DESIGN OF LOW POWER PRE-COMPUTATION BASED CAM USING XOR AND GATE BLOCK SELECTION SCHEME

DESIGN OF LOW POWER PRE-COMPUTATION BASED CAM USING XOR AND GATE BLOCK SELECTION SCHEME

... Each stored word has matchline which indicates that whether the search data and stored data are same or different. Then matchlines are connected to encoder. The encoder gives the match location corresponding to match ...

12

A  Novel  Pre-Computation  Scheme  of  Window $\tau$NAF  for  Koblitz  Curves

A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves

... Solinas’ pre-computation scheme; Hankerson, Menezes, and Vanstone’s pre-computation scheme; Trost and Xu’s pre-computation scheme; and our pre-computation scheme ...

26

A Novel Approach For Multi-Keyword Search In Cloud Computing Using Homomorphic Token Pre-Computation

A Novel Approach For Multi-Keyword Search In Cloud Computing Using Homomorphic Token Pre-Computation

... the computation and communication cost in the query procedure is linear with the number of query keywords in other multiple-keyword search schemes our proposed schemes introduce nearly constant overhead while ...

8

Distributed pre-computation for a cryptanalytic time-memory trade-off

Distributed pre-computation for a cryptanalytic time-memory trade-off

... // if we couldn't write 8 bytes to disk, then there was a disk write failure printf"disk write fail\n"; break; } // starting with the randomly selected index: // 1 convert it to plaintex[r] ...

183

A Non-interactive Deniable Authentication Scheme in the Standard Model

A Non-interactive Deniable Authentication Scheme in the Standard Model

... Abstract: Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interactive ...

6

Analysis  of  the  Non-Perfect  Table  Fuzzy  Rainbow  Tradeoff

Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff

... In the case of the DP tradeoff, the cost of resolving alarms can be reduced slightly [18] through the online chain record (OCR) technique [17, 24]. The method is to keep a full record of the online chain during its ...

33

SIMULATION OF MPC BASED SPEED CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR 
DRIVE

SIMULATION OF MPC BASED SPEED CONTROL OF PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE

... by pre computation of direction of rotation , radix-4 number representation, and the angle generator which has been processed in terms of hardware complexity , iteration delay and memory ...

12

Modified VLSI Architecture for Montgomery Modular Multiplication Bhagyamma S, A L Choodarathnakara, Vindya N D, Swamy Y T, Meghana H

Modified VLSI Architecture for Montgomery Modular Multiplication Bhagyamma S, A L Choodarathnakara, Vindya N D, Swamy Y T, Meghana H

... operand pre computation and format conversion from the carry save format to the binary representation, leading to a short critical path delay at the expense of extra clock cycles for completing one modular ...

9

Improved Crypto Analysis for Scrambling Digital Video Using Secret Key

Improved Crypto Analysis for Scrambling Digital Video Using Secret Key

... The paper proposes AES design combines key schedule and cipher block. Pre computation key is considered in this algorithm. A Matlab file is to get the input video and converted into VHDL using fda tool ...

6

Improvements  to  the  Linear  Operations  of  LowMC:  A  Faster  Picnic

Improvements to the Linear Operations of LowMC: A Faster Picnic

... by pre-computing the round keys, RLL further reduces the runtime for m = 1 to 12 1 and 25 1 , respectively, of the original ...key pre-computation, RLL reduces the runtime to around ...

26

Double Block based Improved Copy Move Forgery Detection

Double Block based Improved Copy Move Forgery Detection

... In this paper, an extension to the existing passive technique of DCT block based copy-move forgery detection method has been presented. The algorithm takes into account the forgeries capable of being detected by sliding ...

9

Speed and Power Optimization of FPGA'S Based on Modified Viterbi Decoder

Speed and Power Optimization of FPGA'S Based on Modified Viterbi Decoder

... of pre-computational steps is preferred even though the iteration bound may not be fully ...two-step pre-computation. The above analysis also reveals that pre-computation is not a good ...

12

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings

... length, pre-computation proxy signature length, computational costs of delegation, delegation verification, proxy signature generation, and proxy signature ...

6

High Speed Viterbi Decoder Design With A Rate Of 1/2 Convolution Code For Tcm Systems

High Speed Viterbi Decoder Design With A Rate Of 1/2 Convolution Code For Tcm Systems

... The reliability and efficiency of data transmission is the most concerning issue for communication channels in today’s digital communications, Error correction technique plays a very important role in communication ...

5

Design and Implementation of a Low Power Modified Viter bi Decoder with T Algorithm
D Padmavathi & Mr B Saidaiah

Design and Implementation of a Low Power Modified Viter bi Decoder with T Algorithm D Padmavathi & Mr B Saidaiah

... a pre-computation architecture incorporated with T-algorithm for VD, which can effectively reduce the power consumption without degrading the decod- ing speed ...optimal pre-computation steps ...

6

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES MANAGEMENT A VHDL Implementation of Low Area Advance Encryption Standard Processor

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES MANAGEMENT A VHDL Implementation of Low Area Advance Encryption Standard Processor

... In this wo rk o u r a i m to a ch i ev e a h ig h th ro ug h pu t co mp a ct. AES S -Bo x wi th mi n i mu m a rea co n su mp ti on . To improve architectures are proposed for implementation of S-Box and Inverse S-box ...

5

Low Cost And High Performance Of Vlsi Architecture For Reconfigurable  Montgomery Modular Multiplication

Low Cost And High Performance Of Vlsi Architecture For Reconfigurable Montgomery Modular Multiplication

... operand pre computation and format conversion from the carry save format to the binary representation, leading to a low hardware cost and short critical path delay at the expense of extra clock cycles for ...

13

Analysis  of  the  Rainbow  Tradeoff  Algorithm  Used  in  Practice

Analysis of the Rainbow Tradeoff Algorithm Used in Practice

... of computation and analysis capture even the disadvantage in table loading time associated with the use of a larger pre-computation table, we are able to consider the minimization of the online time ...

12

Show all 10000 documents...

Related subjects