نتایج جستجو برای: time constant

تعداد نتایج: 2043097  

Journal: :Journal of Applied Probability 2020

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

This paper introduces a new key space for CSIDH and algorithm constant-time evaluation of the group action. The is not useful with previous algorithms, spaces, but combining produces speed records CSIDH. For example, CSIDH-512 256-bit space, best results used 789000 multiplications more than 200 million Skylake cycles; this uses 438006 125.53 cycles.

Journal: :International journal of physical research 2021

The study of time has a long history and is still ongoing. term formulated by Isaac Newton was coined in the 17th century, so naturally it could not relate to thermodynamics. Since passage aging are inalienable components human experience, Newton's concept alive. W.G. Leibniz I. Kant mainly questioned absoluteness time. This paper introduces definition justifies thesis that thermodynamic proces...

Journal: :IEEE Transactions on Image Processing 2007

Journal: :IEEE Transactions on Computers 2018

Journal: :ACM Transactions on Knowledge Discovery From Data 2022

The recent advancements in graph neural networks (GNNs) have led to state-of-the-art performances various applications, including chemo-informatics, question-answering systems, and recommender systems. However, scaling up these methods huge graphs, such as social Web remains a challenge. In particular, the existing for accelerating GNNs either are not theoretically guaranteed terms of approxima...

2016
José Bacelar Almeida Manuel Barbosa Gilles Barthe François Dupressoir Michael Emmi

The constant-time programming discipline is an effective countermeasure against timing attacks, which can lead to complete breaks of otherwise secure systems. However, adhering to constant-time programming is hard on its own, and extremely hard under additional efficiency and legacy constraints. This makes automated verification of constant-time code an essential component for building secure s...

2017
John Renner Deian Stefan

As evermore applications are designed to run inside browsers and other JavaScript runtime systems, there is an increasing need for cryptographic primitives that can be used client-side. Unfortunately, implementing cryptographic primitives securely in high-level languages is extremely difficult—runtime system components such as garbage collectors and just-intime compilers can trivially introduce...

2003
Dimitris Fotakis Rasmus Pagh Peter Sanders

We generalize Cuckoo Hashing 23] to d-ary Cuckoo Hashing and show how this yields a simple hash table data structure that stores n elements in (1 +) n memory cells, for any constant > 0. Assuming uniform hashing, accessing or deleting table entries takes at most d = O(ln 1) probes and the expected amortized insertion time is constant. This is the rst dictionary that has worst case constant acce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید