نتایج جستجو برای: same base multiplication
تعداد نتایج: 925821 فیلتر نتایج به سال:
Efficient scalar multiplication in Abelian groups (which is an important operation in public key cryptography) can be performed using digit expansions. Apart from rational integer bases (double-and-add algorithm), imaginary quadratic integer bases are of interest for elliptic curve cryptography, because the Frobenius endomorphism fulfils a quadratic equation. One strategy for improving the effi...
Analysts examining large-scale information security repositories for propagating network events are interested in quickly identifying temporal and spatial (IP address and/or port) regions containing interesting phenomena, or correlating events from different time periods. The size of these datasets strains current query capabilities provided by, for example, relational databases. We introduce a...
Efficient scalar multiplication in Abelian groups (which is an important operation in public key cryptography) can be performed using digital expansions. Apart from rational integer bases (double-and-add algorithm), imaginary quadratic integer bases are of interest for elliptic curve cryptography, because the Frobenius endomorphism fulfils a quadratic equation. One strategy for improving the ef...
Introduction and summary: Hardware capabilities for integer arithmetic generally include addition, multiplication, and division with precision k typically chosen as 16, 32 or 64. Multiplication and division are often implemented by recursive bit serial algorithms employing O(k) serial additions to avoid the size and power requirements of a large multiplier. The integer addition and multiplicati...
An improved base-f expansion method is proposed, in which the bit-length of coefficients is shorter and the number of coefficients is smaller than in Kobayashi’s expansion method. The proposed method meshes well with efficient multi-exponentiation algorithms. In addition, two efficient algorithms based on the proposed expansion method, named f-wNAF and f-SJSF, are presented which significantly ...
The effects of payoff-matrix multiplication, payoff-matrix addition, the presence of long-run gains versus long-run losses, category discriminability, and base rate on decision criterion learning were examined in 2 perceptual categorization experiments. Observers were found to be sensitive to the effects of payoff-matrix multiplication (and category discriminability) on the steepness of the obj...
Several experiments involving two-dimensional and axisymmetric bodies have been carried out in a Trisonic wind tunnel at supersonic speeds to investigate and analyse the measured values of base pressure and to compare them with those from the theoretical methods. The objective of the experiments was to obtain an appropriate method for processing the results of wind tunnel tests on rockets or ai...
A new elliptic curve scalar multiplication algorithm is proposed. The algorithm o ers about twice the troughput of some conventional OEF-base algorithms because it combines the Frobenius map with the table reference method based on baseexpansion. Furthermore, since this algorithm suits conventional computational units such as 16, 32 and 64 bits, its base eld F p m is expected to enhance ellipti...
The triple-code model, cognitive neuroimaging and developmental behavioral data suggest a specific association between phonological processing and arithmetic fact retrieval. Accordingly, individuals with deficits in phonological processing, such as individuals with developmental dyslexia, are expected to show difficulties in arithmetic fact retrieval. The present study tested this proposal in 2...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید