Search Results - "Hasan, Anwar M"
-
1
A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields
Published in IEEE transactions on computers (01-02-2007)“…Based on Toeplitz matrix-vector products and coordinate transformation techniques, we present a new scheme for subquadratic space complexity parallel…”
Get full text
Journal Article -
2
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory
Published in Cryptography (01-03-2022)“…An adaptor signature can be viewed as a signature concealed with a secret value and, by design, any two of the trio yield the other. In a multiparty setting,…”
Get full text
Journal Article -
3
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Published in IEEE access (2021)“…Classical cryptographic schemes in use today are based on the difficulty of certain number theoretic problems. Security is guaranteed by the fact that the…”
Get full text
Journal Article -
4
Multiway Splitting Method for Toeplitz Matrix Vector Product
Published in IEEE transactions on computers (01-07-2013)“…Computing the product of a Toeplitz matrix and a vector arises in various applications including cryptography. In this paper, we consider Toeplitz matrices and…”
Get full text
Journal Article -
5
Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases
Published in IEEE transactions on computers (01-10-2007)“…Based on a recently proposed Toeplitz matrix-vector product approach, a subquadratic computational complexity scheme is presented for multiplications in binary…”
Get full text
Journal Article -
6
Sulfadoxine-Pyrimethamine, Chlorproguanil-Dapsone, or Chloroquine for the Treatment of Plasmodium vivax Malaria in Afghanistan and Pakistan: A Randomized Controlled Trial
Published in JAMA : the journal of the American Medical Association (23-05-2007)“…CONTEXT In areas where Plasmodium falciparum and Plasmodium vivax coexist and treatments for the 2 species differ, misdiagnosis can lead to poor outcomes in…”
Get full text
Journal Article -
7
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Published in IEEE transactions on information forensics and security (01-03-2015)“…Increasingly more and more organizations are opting for outsourcing data to remote cloud service providers (CSPs). Customers can rent the CSPs storage…”
Get full text
Journal Article -
8
A digital rights management system based on a scalable blockchain
Published in Peer-to-peer networking and applications (01-09-2021)“…Even though the Internet promotes data sharing and transparency, however it does not protect digital content. In today’s digital world, it has become a…”
Get full text
Journal Article -
9
Error Detection and Fault Tolerance in ECSM Using Input Randomization
Published in IEEE transactions on dependable and secure computing (01-07-2009)“…For some applications, elliptic curve cryptography (ECC) is an attractive choice because it achieves the same level of security with a much smaller key size in…”
Get full text
Journal Article -
10
Inhibition of human T-cell proliferation by mammalian target of rapamycin (mTOR) antagonists requires noncoding RNA growth-arrest-specific transcript 5 (GAS5)
Published in Molecular pharmacology (01-07-2010)“…The central importance of the serine/threonine protein kinase mTOR (mammalian Target of Rapamycin) in the control of cell growth and proliferation is well…”
Get more information
Journal Article -
11
Energy Consumption Analysis of XRP Validator
Published in 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (01-05-2020)“…The XRP Ledger is an open-source payment system with a primary focus on providing an efficient cross-border payment network. The advancement of the XRP Ledger…”
Get full text
Conference Proceeding -
12
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling
Published in IACR transactions on cryptographic hardware and embedded systems (09-06-2023)“…Strategies and their evaluations play important roles in speeding up the computation of large smooth-degree isogenies. The concept of optimal strategies for…”
Get full text
Journal Article -
13
High-Performance Architecture of Elliptic Curve Scalar Multiplication
Published in IEEE transactions on computers (01-11-2008)“…A high performance architecture of elliptic curve scalar multiplication based on the Montgomery ladder method over finite field GF(2 m ) is proposed. A…”
Get full text
Journal Article -
14
Some new results on binary polynomial multiplication
Published in Journal of cryptographic engineering (01-11-2015)“…This paper presents several methods for reducing the number of bit operations for multiplication of polynomials over the binary field. First, a modified…”
Get full text
Journal Article -
15
New Efficient Algorithms for Multiplication Over Fields of Characteristic Three
Published in Journal of signal processing systems (01-03-2018)“…In this paper, we first present an enhancement of the well-known Karatsuba 2-way and 3-way algorithms for characteristic three fields, denoted by 𝔽 3 n where…”
Get full text
Journal Article -
16
Correction to: A digital rights management system based on a scalable blockchain
Published in Peer-to-peer networking and applications (01-07-2021)“…A Correction to this paper has been published: https://doi.org/10.1007/s12083-021-01098-2…”
Get full text
Journal Article -
17
Block Recombination Approach for Subquadratic Space Complexity Binary Field Multiplication Based on Toeplitz Matrix-Vector Product
Published in IEEE transactions on computers (01-02-2012)“…In this paper, we present a new method for parallel binary finite field multiplication which results in subquadratic space complexity. The method is based on…”
Get full text
Journal Article -
18
Low Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Published in IEEE transactions on computers (01-04-2011)“…We study Dickson bases for binary field representation. Such a representation seems interesting when no optimal normal basis exists for the field. We express…”
Get full text
Journal Article -
19
Fast Bit Parallel-Shifted Polynomial Basis Multipliers in GF(2^)
Published in IEEE transactions on circuits and systems. I, Regular papers (01-12-2006)“…A new nonpipelined bit-parallel-shifted polynomial basis multiplier for GF(2 n ) is presented. For some irreducible trinomials, the space complexity of the…”
Get full text
Journal Article -
20
Fault-Based Attack on Montgomery’s Ladder Algorithm
Published in Journal of cryptology (01-04-2011)“…In this paper we present invalid-curve attacks that apply to the Montgomery ladder elliptic curve scalar multiplication (ECSM) algorithm. An elliptic curve…”
Get full text
Journal Article