## Stem ellipt$ (all stems)

### 20 papers:

- DAC-2014-HollerDKSF #co-evolution #design #encryption #hardware
- Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications (AH, ND, CK, CS, TF), p. 6.
- ICPR-2012-ChumM #estimation
- Homography estimation from correspondences of local elliptical features (OC, JM), pp. 3236–3239.
- ICPR-2010-LiLD #learning #using
- Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
- ICPR-2010-SoldeaUE #fourier
- Moments of Elliptic Fourier Descriptors (OS, MU, AE), pp. 3521–3524.
- CHI-2009-FeketeEG #named #using
- Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
- DATE-2008-PurnaprajnaPP #configuration management #encryption #multi #power management
- Power Aware Reconfigurable Multiprocessor for Elliptic Curve Cryptography (MP, CP, MP), pp. 1462–1467.
- DATE-2007-PeterLP #encryption #flexibility #hardware #reduction
- Flexible hardware reduction for elliptic curve cryptography in GF(2m) (SP, PL, KP), pp. 1259–1264.
- DATE-2006-GrossschadlIPTV #algorithm #case study #design #encryption #set
- Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography (JG, PI, LP, ST, AKV), pp. 218–223.
- DATE-2005-CheungLC #configuration management
- Reconfigurable Elliptic Curve Cryptosystems on a Chip (RCCC, WL, PYKC), pp. 24–29.
- DATE-2005-DykaL #encryption #hardware #implementation #performance
- Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method (ZD, PL), pp. 70–75.
- SAC-2005-Strangio #performance #protocol
- Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
- SAC-2004-MotaiK #3d #feature model #locality #robust
- Concatenate feature extraction for robust 3D elliptic object localization (YM, AK), pp. 21–28.
- DRR-2003-CinqueLMR #theorem
- Fermat theorem and elliptic color histogram features (LC, SL, AM, FDR), pp. 234–240.
- ICDAR-2003-BezineAD
- Handwriting Trajectory Movements Controlled by a Bêta-Elliptic Model (HB, AMA, ND), pp. 1228–1232.
- ICPR-v2-2002-YangP02b #3d #detection #named
- CHEF: Convex Hull of Elliptic Features for 3D Blob Detection (QY, BP), pp. 282–285.
- ICPR-v1-2000-Rosin
- Measuring Shape: Ellipticity, Rectangularity, and Triangularity (PLR), pp. 1952–1955.
- ICPR-1996-JacksonA
- Elliptical Gaussian filters (SAJ, NA), pp. 775–779.
- SAC-1993-KelleherLD #equation #on the #parallel #performance #reduction
- On the Performance of a Direct Parallel Method for Solving Separable Elliptic Equations Based on Block Cyclic Reduction (KK, SL, SKD), pp. 517–524.
- SEKE-1992-SotiropoulouP #case study #difference #equation #information management
- A Case Study of Knowledge Engineering in the Application Area of Elliptic Partial Differential Equations (PDE’s) (VVS, TSP), pp. 261–268.
- STOC-1991-MenezesVO #finite
- Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field (AM, SAV, TO), pp. 80–89.