BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
curv (8)
cryptographi (5)
featur (4)
hardwar (3)
effici (2)

Stem ellipt$ (all stems)

20 papers:

DACDAC-2014-HollerDKSF #co-evolution #design #encryption #hardware
Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications (AH, ND, CK, CS, TF), p. 6.
ICPRICPR-2012-ChumM #estimation
Homography estimation from correspondences of local elliptical features (OC, JM), pp. 3236–3239.
ICPRICPR-2010-LiLD #learning #using
Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
ICPRICPR-2010-SoldeaUE #fourier
Moments of Elliptic Fourier Descriptors (OS, MU, AE), pp. 3521–3524.
CHICHI-2009-FeketeEG #named #using
Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
DATEDATE-2008-PurnaprajnaPP #configuration management #encryption #multi #power management
Power Aware Reconfigurable Multiprocessor for Elliptic Curve Cryptography (MP, CP, MP), pp. 1462–1467.
DATEDATE-2007-PeterLP #encryption #flexibility #hardware #reduction
Flexible hardware reduction for elliptic curve cryptography in GF(2m) (SP, PL, KP), pp. 1259–1264.
DATEDATE-2006-GrossschadlIPTV #algorithm #case study #design #encryption #set
Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography (JG, PI, LP, ST, AKV), pp. 218–223.
DATEDATE-2005-CheungLC #configuration management
Reconfigurable Elliptic Curve Cryptosystems on a Chip (RCCC, WL, PYKC), pp. 24–29.
DATEDATE-2005-DykaL #encryption #hardware #implementation #performance
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method (ZD, PL), pp. 70–75.
SACSAC-2005-Strangio #performance #protocol
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
SACSAC-2004-MotaiK #3d #feature model #locality #robust
Concatenate feature extraction for robust 3D elliptic object localization (YM, AK), pp. 21–28.
DRRDRR-2003-CinqueLMR #theorem
Fermat theorem and elliptic color histogram features (LC, SL, AM, FDR), pp. 234–240.
ICDARICDAR-2003-BezineAD
Handwriting Trajectory Movements Controlled by a Bêta-Elliptic Model (HB, AMA, ND), pp. 1228–1232.
ICPRICPR-v2-2002-YangP02b #3d #detection #named
CHEF: Convex Hull of Elliptic Features for 3D Blob Detection (QY, BP), pp. 282–285.
ICPRICPR-v1-2000-Rosin
Measuring Shape: Ellipticity, Rectangularity, and Triangularity (PLR), pp. 1952–1955.
ICPRICPR-1996-JacksonA
Elliptical Gaussian filters (SAJ, NA), pp. 775–779.
SACSAC-1993-KelleherLD #equation #on the #parallel #performance #reduction
On the Performance of a Direct Parallel Method for Solving Separable Elliptic Equations Based on Block Cyclic Reduction (KK, SL, SKD), pp. 517–524.
SEKESEKE-1992-SotiropoulouP #case study #difference #equation #information management
A Case Study of Knowledge Engineering in the Application Area of Elliptic Partial Differential Equations (PDE’s) (VVS, TSP), pp. 261–268.
STOCSTOC-1991-MenezesVO #finite
Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field (AM, SAV, TO), pp. 80–89.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.