-
2
-
-
36849034915
-
-
Technical report, National Institute of Standards and Technology NIST, August 24
-
Report on the second modes of operation workshop. Technical report, National Institute of Standards and Technology (NIST), August 24, 2001.
-
(2001)
Report on the second modes of operation workshop
-
-
-
3
-
-
0036590708
-
The data locality of work stealing
-
U. A. Acar, G. E. Blelloch, and R. D. Blumofe. The data locality of work stealing. Theory Comput. Syst., 35(3):321-347, 2002.
-
(2002)
Theory Comput. Syst
, vol.35
, Issue.3
, pp. 321-347
-
-
Acar, U.A.1
Blelloch, G.E.2
Blumofe, R.D.3
-
4
-
-
0036590708
-
The data locality of work stealing
-
U. A. Acar, G. E. Blelloch, and R. D. Blumofe. The data locality of work stealing. Theory Comput. Syst., 35(3):321-347, 2002.
-
(2002)
Theory Comput. Syst
, vol.35
, Issue.3
, pp. 321-347
-
-
Acar, U.A.1
Blelloch, G.E.2
Blumofe, R.D.3
-
5
-
-
35248832108
-
STAPL: An Adaptive, Generic Parallel C++ Library
-
P. An, A. Jula, S. Rus, S. Saunders, T. Smith, G. Tanase, N. Thomas, N. M. Amato, and L. Rauchwerger. STAPL: An Adaptive, Generic Parallel C++ Library. In LCPC, pages 193-208, 2001. http://parasol.tamu.edu/groups/ rwergergroup/research/stapl/.
-
(2001)
LCPC
, pp. 193-208
-
-
An, P.1
Jula, A.2
Rus, S.3
Saunders, S.4
Smith, T.5
Tanase, G.6
Thomas, N.7
Amato, N.M.8
Rauchwerger, L.9
-
6
-
-
0035608253
-
Thread scheduling for multiprogrammed multiprocessors
-
N. S. Arora, R. D. Blumofe, and C. G. Plaxton. Thread scheduling for multiprogrammed multiprocessors. Theory Comput. Syst., 34(2):115-144, 2001.
-
(2001)
Theory Comput. Syst
, vol.34
, Issue.2
, pp. 115-144
-
-
Arora, N.S.1
Blumofe, R.D.2
Plaxton, C.G.3
-
7
-
-
36849071358
-
-
O. Beaumont, E. Daoudi, N. Maillard, P. Manneback, and J.-L. Roch. Tradeoff to minimize extra-computations and stopping criterion tests for parallel iterative schemes. In 3rd International Workshop on Parallel Matrix Algorithms and Applications (PMAA04), CIRM, Marseille, France, October 2004.
-
O. Beaumont, E. Daoudi, N. Maillard, P. Manneback, and J.-L. Roch. Tradeoff to minimize extra-computations and stopping criterion tests for parallel iterative schemes. In 3rd International Workshop on Parallel Matrix Algorithms and Applications (PMAA04), CIRM, Marseille, France, October 2004.
-
-
-
-
8
-
-
0036590677
-
Online scheduling of parallel programs on heterogeneous systems with applications to cilk
-
M. A. Bender and M. O. Rabin. Online scheduling of parallel programs on heterogeneous systems with applications to cilk. Theory Comput. Syst., 35(3):289-304, 2002.
-
(2002)
Theory Comput. Syst
, vol.35
, Issue.3
, pp. 289-304
-
-
Bender, M.A.1
Rabin, M.O.2
-
9
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. In J. Cryptology, volume 4 (1), pages 3-72, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
10
-
-
84957677472
-
Differential cryptanalysis of the full 16-round DES
-
D. W. Davies, editor, Advances in Cryptology -Crypto'92, Springer-Verlag
-
E. Biham and A. Shamir. Differential cryptanalysis of the full 16-round DES. In D. W. Davies, editor, Advances in Cryptology -Crypto'92, LNCS 740, pages 487-497. Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.740
, pp. 487-497
-
-
Biham, E.1
Shamir, A.2
-
11
-
-
35248818760
-
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
-
Advances in Cryptology, Eurocrypt 2003, Springer-Verlag
-
A. Biryukov, C. de Cannière, A. Braeken, and B. Preenel. A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. In Advances in Cryptology - Eurocrypt 2003, LNCS 2656, pages 33-50. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 33-50
-
-
Biryukov, A.1
de Cannière, C.2
Braeken, A.3
Preenel, B.4
-
12
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Extended version
-
N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Asiacrypt 2002, pages 267-287, 2002. Extended version: http://eprint.iacr.org/2002/044.
-
(2002)
Asiacrypt 2002
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
13
-
-
36849095016
-
-
J. Daemen, L. Knudsen, and V. Rijmen. The Block Cipher Square
-
J. Daemen, L. Knudsen, and V. Rijmen. The Block Cipher Square.
-
-
-
-
16
-
-
84908538816
-
Athapascan-1: On-line Building Data Flow Graph in a Parallel Language. In IEEE, editor
-
Paris, France, October
-
F. Galilée, J.-L. Roch, G. Cavalheiro, and M. Doreille. Athapascan-1: On-line Building Data Flow Graph in a Parallel Language. In IEEE, editor, International Conference on Parallel Architectures and Compilation Techniques, PACT'98, pages 88-95, Paris, France, October 1998.
-
(1998)
International Conference on Parallel Architectures and Compilation Techniques, PACT'98
, pp. 88-95
-
-
Galilée, F.1
Roch, J.-L.2
Cavalheiro, G.3
Doreille, M.4
-
17
-
-
78349241601
-
Fine grain distributed implementation of a dataflow language with provable performances
-
Beijing, China, May
-
T. Gautier, J.-L. Roch, and F. Wagner. Fine grain distributed implementation of a dataflow language with provable performances. In ICCS 2007 / PAPP 2007 4th Int. Workshop on Practical Aspects of High-Level Parallel Programming, Beijing, China, May 2007.
-
(2007)
ICCS 2007 / PAPP 2007 4th Int. Workshop on Practical Aspects of High-Level Parallel Programming
-
-
Gautier, T.1
Roch, J.-L.2
Wagner, F.3
-
19
-
-
33947141945
-
-
S. Jafar, A. W. Krings, T. Gautier, and J.-L. Roch. Theft-induced checkpointing for reconfigurable dataflow applications. In IEEE, editor, IEEE Electro/Information Technology Conference , (EIT 2005), Lincoln, Nebraska, May 2005. This paper received the EIT'05 Best Paper Award.
-
S. Jafar, A. W. Krings, T. Gautier, and J.-L. Roch. Theft-induced checkpointing for reconfigurable dataflow applications. In IEEE, editor, IEEE Electro/Information Technology Conference , (EIT 2005), Lincoln, Nebraska, May 2005. This paper received the EIT'05 Best Paper Award.
-
-
-
-
20
-
-
0003325628
-
-
Addison-Wesley, Reading, Massachusetts, third edition
-
D. E. Knuth. The Art of Computer Programming, volume 2, page 145. Addison-Wesley, Reading, Massachusetts, third edition, 1997.
-
(1997)
The Art of Computer Programming
, vol.2
, pp. 145
-
-
Knuth, D.E.1
-
21
-
-
0012988046
-
Comments to NIST concerning AES-modes of operations: CTR-mode encryption
-
Baltimore, Maryland, USA
-
H. Lipmaa, P. Rogaway, and D. Wagner. Comments to NIST concerning AES-modes of operations: CTR-mode encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, USA, 2000.
-
(2000)
Symmetric Key Block Cipher Modes of Operation Workshop
-
-
Lipmaa, H.1
Rogaway, P.2
Wagner, D.3
-
23
-
-
0031599142
-
Mersenne Twistor: A 623-diminsionally equidistributed uniform pseudorandom number generator
-
Jan
-
M. Matsumoto and T. Nishimura. Mersenne Twistor: A 623-diminsionally equidistributed uniform pseudorandom number generator. In ACM Transactions on Modeling and Computer Simulation, volume 8, pages 3-30, Jan. 1998. http://www.math.keio.ac.jp/~matumoto/emt.html.
-
(1998)
ACM Transactions on Modeling and Computer Simulation
, vol.8
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
24
-
-
36849042086
-
-
MOAIS Team. KAAPI. http://kaapi.gforge.inria.fr/, 2005.
-
MOAIS Team. KAAPI. http://kaapi.gforge.inria.fr/, 2005.
-
-
-
-
25
-
-
0003438160
-
STL tutorial and reference guide
-
second edition:, Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
-
D. R. Musser, G. J. Derge, and A. Saini. STL tutorial and reference guide, second edition: C++ programming with the standard template library. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2001.
-
(2001)
C++ programming with the standard template library
-
-
Musser, D.R.1
Derge, G.J.2
Saini, A.3
-
26
-
-
84962968104
-
Differentially Uniform Mappings for Cryptography
-
Eurocrypt 93, Springer-Verlag
-
K. Nyberg. Differentially Uniform Mappings for Cryptography. In Eurocrypt 93, LNCS 765, pages 55-64. Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.765
, pp. 55-64
-
-
Nyberg, K.1
-
28
-
-
36849012048
-
On-line adaptive parallel prefix computation
-
L. Springer-Verlag, editor, Dresden, Germany, August
-
J.-L. Roch, D. Traore, and J. Bernard. On-line adaptive parallel prefix computation. In L. Springer-Verlag, editor, EUROPAR'2006, pages 843-850, Dresden, Germany, August 2006.
-
(2006)
EUROPAR'2006
, pp. 843-850
-
-
Roch, J.-L.1
Traore, D.2
Bernard, J.3
-
29
-
-
0003851399
-
-
Wiley, New York, 2nd edition
-
B. Schneier. Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York, 2nd edition, 1996, pages 201-226.
-
(1996)
Applied cryptography: Protocols, algorithms, and source code in C
, pp. 201-226
-
-
Schneier, B.1
|