We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 292 results
  1. Power Awareness in Low Precision Neural Networks

    Existing approaches for reducing DNN power consumption rely on quite general principles, including avoidance of multiplication operations and...
    Nurit S**arn Eliezer, Ron Banner, ... Tomer Michaeli in Computer Vision – ECCV 2022 Workshops
    Conference paper 2023
  2. Trisymmetric Multiplication Formulae in Finite Fields

    Multiplication is an expensive arithmetic operation, therefore there has been extensive research to find Karatsuba-like formulae reducing the number...
    Hugues Randriambololona, Édouard Rousseau in Arithmetic of Finite Fields
    Conference paper 2021
  3. An Estimator for the Hardness of the MQ Problem

    The Multivariate Quadratic ( \(\textsf {MQ}\) )...
    Emanuele Bellini, Rusydi H. Makarim, ... Javier Verbel in Progress in Cryptology - AFRICACRYPT 2022
    Conference paper 2022
  4. Optimized Hybrid Execution of Dense Matrix-Matrix Multiplication on Clusters of Heterogeneous Multicore and Many-Core Platforms

    In this paper we analytically solve the partitioning problem for dense matrix-matrix multiplication, running on a cluster of heterogeneous multicore...
    Gerassimos Barlas in Parallel Computing Technologies
    Conference paper 2021
  5. Factorization of Polynomials Given by Arithmetic Branching Programs

    Given a multivariate polynomial computed by an arithmetic branching program (ABP) of size s , we show that all its factors can be computed by...

    Amit Sinhababu , Thomas Thierauf in computational complexity
    Article Open access 15 October 2021
  6. Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm

    This paper presents the first recursive secure multiparty computation protocol for matrix multiplication, based on Strassen-Winograd algorithm. We...
    Jean-Guillaume Dumas, Pascal Lafourcade, ... Maxime Puys in Advances in Information and Computer Security
    Conference paper 2019
  7. Total Break of a Public Key Cryptosystem Based on a Group of Permutation Polynomials

    In this paper, we respond to the proposal of the Permutation Polynomial Encryption Scheme, introduced by Singh, Sarma, and Saikia in 2020. We...
    Max Cartor, Ryann Cartor, ... Daniel Smith-Tone in Advances in Information and Computer Security
    Conference paper 2023
  8. A Toolkit for Parikh Matrices

    The Parikh matrix map** is a concept that provides information on the number of occurrences of certain (scattered) subwords in a word. Although...
    Laura K. Hutchinson, Robert Mercaş, Daniel Reidenbach in Implementation and Application of Automata
    Conference paper 2022
  9. An efficient lightweight CNN acceleration architecture for edge computing based-on FPGA

    With the system performance, volume and power restriction requirements in edge computing, single chip based on Field Programmable Gate Array (FPGA),...

    Ruidong Wu, Bing Liu, ... Haolin Chen in Applied Intelligence
    Article 18 October 2022
  10. Towards efficient tile low-rank GEMM computation on sunway many-core processors

    Tile low-rank general matrix multiplication (TLR GEMM) is a novel method of matrix multiplication on large data-sparse matrices, which can...

    Qingchang Han, Hailong Yang, ... Depei Qian in The Journal of Supercomputing
    Article 15 October 2020
  11. Acceleration of Multiple Precision Matrix Multiplication Based on Multi-component Floating-Point Arithmetic Using AVX2

    In this paper, we report the results obtained from the acceleration of multi-binary64-type multiple precision block and Strassen matrix...
    Conference paper 2021
  12. A Deterministic Algorithm for Computing Divisors in an Interval

    We revisit the problem of finding a nontrivial divisor of a composite integer when it has a divisor in an interval \([\alpha , \beta ]\) . We use...
    Liqiang Peng, Yao Lu, ... Lei Hu in Information Security and Privacy
    Conference paper 2018
  13. Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing

    We propose a theoretical analysis of a novel source routing scheme called XSR. XSR uses linear encoding operation to both (1) build the path labels...

    Jérôme Lacan, Emmanuel Lochin in Journal of Network and Systems Management
    Article 21 December 2023
  14. The Matrix Reloaded: Multiplication Strategies in FrodoKEM

    Lattice-based schemes are promising candidates to replace the current public-key cryptographic infrastructure in wake of the looming threat of...
    Joppe W. Bos, Maximilian Ofner, ... Christine van Vredendaal in Cryptology and Network Security
    Conference paper 2021
  15. Practical Attack on All Parameters of the DME Signature Scheme

    DME is a multivariate scheme submitted to the call for additional signatures recently launched by NIST. Its performance is one of the best among all...
    Pierre Briaud, Maxime Bros, ... Daniel Smith-Tone in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  16. LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding

    We propose the new rank-metric code-based cryptosystem LIGA which is based on the hardness of l ist decoding and i nterleaved decoding of Ga bidulin...

    Julian Renner, Sven Puchinger, Antonia Wachter-Zeh in Designs, Codes and Cryptography
    Article Open access 18 April 2021
  17. Recursive SQL and GPU-support for in-database machine learning

    In machine learning, continuously retraining a model guarantees accurate predictions based on the latest data as training input. But to retrieve the...

    Maximilian E. Schüle, Harald Lang, ... Stephan Günnemann in Distributed and Parallel Databases
    Article Open access 09 July 2022
  18. Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato

    Symmetric primitives are a cornerstone of cryptography, and have traditionally been defined over fields, where cryptanalysis is now well understood....
    Lorenzo Grassi, Irati Manterola Ayala, ... Qingju Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  19. Numerical Problems

    If most problems you encounter are numerical in nature, there is an excellent chance that you are reading the wrong book.
    Steven S. Skiena in The Algorithm Design Manual
    Chapter 2020
  20. Another Dubious Way to Compute the Exponential of a Matrix

    In this paper we analyzed recent works on inverting Vandermonde matrix, both classical and generalized, which were unknown during the publication of...
    Conference paper 2021
Did you find what you were looking for? Share feedback.