-
2
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," Foundations of secure computation, vol. 32, no. 4, pp. 169-178, 1978.
-
(1978)
Foundations of Secure Computation
, vol.32
, Issue.4
, pp. 169-178
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
3
-
-
79957974657
-
Implementing Gentry's fully-homomorphic encryption scheme
-
C. Gentry and S. Halevi, "Implementing Gentry's fully-homomorphic encryption scheme," Advances in Cryptology-EUROCRYPT 2011, pp. 129-148, 2011.
-
(2011)
Advances in Cryptology-EUROCRYPT 2011
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
4
-
-
84873551357
-
SIPHER: Scalable implementation of primitives for homomorphic encryption-FPGA implementation using Simulink
-
D. Cousins, K. Rohloff, C. Peikert, and R. Schantz, "SIPHER: Scalable implementation of primitives for homomorphic encryption-FPGA implementation using Simulink," High Performance Extreme Computing Conference, 2011.
-
(2011)
High Performance Extreme Computing Conference
-
-
Cousins, D.1
Rohloff, K.2
Peikert, C.3
Schantz, R.4
-
5
-
-
77949596908
-
Improving performance of matrix multiplication and fft on gpu
-
IEEE
-
X. Cui, Y. Chen, and H. Mei, "Improving performance of matrix multiplication and fft on gpu," in Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on. IEEE, 2009, pp. 42-48.
-
(2009)
Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on
, pp. 42-48
-
-
Cui, X.1
Chen, Y.2
Mei, H.3
-
6
-
-
29844438097
-
Fast and approximate stream mining of quantiles and frequencies using graphics processors
-
DOI 10.1145/1066157.1066227, SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
N. Govindaraju, N. Raghuvanshi, and D. Manocha, "Fast and approximate stream mining of quantiles and frequencies using graphics processors," in Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, 2005, pp. 611-622. (Pubitemid 43038962)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 611-622
-
-
Govindaraju, N.K.1
Raghuvanshi, N.2
Manocha, D.3
-
7
-
-
84873558745
-
Three applications of gpu computing in neuroscience
-
J. Baladron Pezoa, D. Fasoli, and O. Faugeras, "Three applications of gpu computing in neuroscience," Computing in Science & Engineering, no. 99, pp. 1-1, 2011.
-
(2011)
Computing in Science & Engineering
, Issue.99
, pp. 1-1
-
-
Baladron Pezoa, J.1
Fasoli, D.2
Faugeras, O.3
-
9
-
-
34250459760
-
Schnelle multiplikation grosser zahlen
-
A. Schonhage and V. Strassen, "Schnelle multiplikation grosser zahlen," Computing, vol. 7, no. 3, pp. 281-292, 1971.
-
(1971)
Computing
, vol.7
, Issue.3
, pp. 281-292
-
-
Schonhage, A.1
Strassen, V.2
-
10
-
-
80052906034
-
High precision integer multiplication with a gpu using strassen's algorithm with multiple fft sizes
-
N. Emmart and C. Weems, "High precision integer multiplication with a gpu using strassen's algorithm with multiple fft sizes," Parallel Processing Letters, vol. 21, no. 3, p. 359, 2011.
-
(2011)
Parallel Processing Letters
, vol.21
, Issue.3
, pp. 359
-
-
Emmart, N.1
Weems, C.2
-
11
-
-
0012584245
-
Generalized mersenne numbers
-
J. Solinas, "Generalized mersenne numbers," Technical Reports, 1999.
-
(1999)
Technical Reports
-
-
Solinas, J.1
-
13
-
-
4143149431
-
Fast montgomery modular multiplication and rsa cryptographic processor architectures
-
IEEE
-
C. Mclvor, M. McLoone, and J. McCanny, "Fast montgomery modular multiplication and rsa cryptographic processor architectures," in Signals, Systems and Computers, 2003. Conference Record of the Thirty-Seventh Asilomar Conference on, vol. 1. IEEE, 2003, pp. 379-384.
-
(2003)
Signals, Systems and Computers, 2003. Conference Record of the Thirty-Seventh Asilomar Conference on
, vol.1
, pp. 379-384
-
-
McLvor, C.1
McLoone, M.2
McCanny, J.3
-
16
-
-
84966243285
-
Modular multiplication without trial division
-
P. Montgomery, "Modular multiplication without trial division," Mathematics of computation, vol. 44, no. 170, pp. 519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.1
-
17
-
-
85034497704
-
Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor
-
Springer
-
P. Barrett, "Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor," in Advances in Cryptology: CRYPTO 1986. Springer, 1987, pp. 311-323.
-
(1987)
Advances in Cryptology: CRYPTO 1986.
, pp. 311-323
-
-
Barrett, P.1
|