Results 21  30
of
231
Learning Functions Represented as Multiplicity Automata
, 2000
"... We study the learnability of multiplicity automata in Angluin’s exact learning model, and we investigate its applications. Our starting point is a known theorem from automata theory relating the ..."
Abstract

Cited by 27 (2 self)
 Add to MetaCart
We study the learnability of multiplicity automata in Angluin’s exact learning model, and we investigate its applications. Our starting point is a known theorem from automata theory relating the
Distribution results for lowweight binary representations for pairs of integers, Theoret
 Comput. Sci
, 2004
"... Abstract. We discuss an optimal method for the computation of linear combinations of elements of Abelian groups, which uses signed digit expansions. This has applications in elliptic curve cryptography. We compute the expected number of operations asymptotically (including a periodically oscillating ..."
Abstract

Cited by 22 (17 self)
 Add to MetaCart
Abstract. We discuss an optimal method for the computation of linear combinations of elements of Abelian groups, which uses signed digit expansions. This has applications in elliptic curve cryptography. We compute the expected number of operations asymptotically (including a periodically oscillating second order term) and prove a central limit theorem. Apart from the usual righttoleft (i.e., least significant digit first) approach we also discuss a lefttoright computation of the expansions. This exhibits fractal structures that are studied in some detail. 1.
Random matrix theory over finite fields
 Bull. Amer. Math. Soc. (N.S
"... Abstract. The first part of this paper surveys generating functions methods in the study of random matrices over finite fields, explaining how they arose from theoretical need. Then we describe a probabilistic picture of conjugacy classes of the finite classical groups. Connections are made with sym ..."
Abstract

Cited by 22 (6 self)
 Add to MetaCart
Abstract. The first part of this paper surveys generating functions methods in the study of random matrices over finite fields, explaining how they arose from theoretical need. Then we describe a probabilistic picture of conjugacy classes of the finite classical groups. Connections are made with symmetric function theory, Markov chains, RogersRamanujan type identities, potential theory, and various measures on partitions.
Optimization Rules for Programming with Collective Operations
 IPPS/SPDP'99. 13th Int. Parallel Processing Symp. & 10th Symp. on Parallel and Distributed Processing
, 1999
"... We study how several collective operations like broadcast, reduction, scan, etc. can be composed efficiently in complex parallel programs. Our specific contributions are: (1) a formal framework for reasoning about collective operations; (2) a set of optimization rules which save communications by fu ..."
Abstract

Cited by 21 (6 self)
 Add to MetaCart
We study how several collective operations like broadcast, reduction, scan, etc. can be composed efficiently in complex parallel programs. Our specific contributions are: (1) a formal framework for reasoning about collective operations; (2) a set of optimization rules which save communications by fusing several collective operations into one; (3) performance estimates, which guide the application of optimization rules depending on the machine characteristics; (4) a simple case study with the first results of machine experiments.
SIMDoriented fast Mersenne twister: A 128bit pseudorandom number generator
 and QuasiMonte Carlo Methods 2006
, 2007
"... Summary. Mersenne Twister (MT) is a widelyused fast pseudorandom number generator (PRNG) with a long period of 2 19937 − 1, designed 10 years ago based on 32bit operations. In this decade, CPUs for personal computers have acquired new features, such as Single Instruction Multiple Data (SIMD) opera ..."
Abstract

Cited by 19 (1 self)
 Add to MetaCart
Summary. Mersenne Twister (MT) is a widelyused fast pseudorandom number generator (PRNG) with a long period of 2 19937 − 1, designed 10 years ago based on 32bit operations. In this decade, CPUs for personal computers have acquired new features, such as Single Instruction Multiple Data (SIMD) operations (i.e., 128bit operations) and multistage pipelines. Here we propose a 128bit based PRNG, named SIMDoriented Fast Mersenne Twister (SFMT), which is analogous to MT but making full use of these features. Its recursion fits pipeline processing better than MT, and it is roughly twice as fast as optimised MT using SIMD operations. Moreover, the dimension of equidistribution of SFMT is better than MT. We also introduce a blockgeneration function, which fills an array of 32bit integers in one call. It speeds up the generation by a factor of two. A speed comparison with other modern generators, such as multiplicative recursive generators, shows an advantage of SFMT. The implemented Ccodes are downloadable from
Randomized signedscalar multiplication of ECC to resist power attacks
 In Cryptographic Hardware and Embedded Systems – CHES ’02, LNCS
, 2002
"... Abstract. Recently it has been shown that smart cards as cryptographic devices are vulnerable to power attacks if they have no defence against them. Randomization on ECC scalar multiplication is one of the fundamental concepts in methods of defence against sidechannel attacks. In this paper by usin ..."
Abstract

Cited by 19 (2 self)
 Add to MetaCart
Abstract. Recently it has been shown that smart cards as cryptographic devices are vulnerable to power attacks if they have no defence against them. Randomization on ECC scalar multiplication is one of the fundamental concepts in methods of defence against sidechannel attacks. In this paper by using the randomization concept together with the NAF recoding algorithm, we propose an efficient countermeasure for ECCs against power attacks. The countermeasure provides a randomized signedscalar representation at every scalar multiplication to resist DPA. To protect against SPA it additionally employs a simple SPAimmune additionsubtraction multiplication algorithm. Our analysis shows that it needs no additional computation load compared to the ordinary binary scalar multiplication, where the average number of doublings plus additions for a bit length n is 1.5n+O(1).
A relative van Hoeij algorithm over number fields
 J. Symbolic Computation
, 2004
"... Abstract. Van Hoeij’s algorithm for factoring univariate polynomials over the rational integers rests on the same principle as BerlekampZassenhaus, but uses lattice basis reduction to improve drastically on the recombination phase. His ideas give rise to a collection of algorithms, differing greatl ..."
Abstract

Cited by 19 (1 self)
 Add to MetaCart
Abstract. Van Hoeij’s algorithm for factoring univariate polynomials over the rational integers rests on the same principle as BerlekampZassenhaus, but uses lattice basis reduction to improve drastically on the recombination phase. His ideas give rise to a collection of algorithms, differing greatly in their efficiency. We present two deterministic variants, one of which achieves excellent overall performance. We then generalize these ideas to factor polynomials over
Breaking the Barriers: High Performance Security for High Performance Computing
 Proc. Workshop on New security paradigms
, 2002
"... This paper attempts to reconcile the high performance community's requirement of high performance with the need for security, and reconcile some accepted security approaches with the performance constraints of highperformance networks. We propose a new paradigm and challenge existing practice. The ..."
Abstract

Cited by 19 (0 self)
 Add to MetaCart
This paper attempts to reconcile the high performance community's requirement of high performance with the need for security, and reconcile some accepted security approaches with the performance constraints of highperformance networks. We propose a new paradigm and challenge existing practice. The new paradigm is that not all domains need longterm forward data confidentiality. In particular, we take a fresh look at security for the highperformance domain, focusing particularly on componentbased applications. We discuss the security and performance requirements of this domain in order to elucidate both the constraints and opportunities. We challenge the existing practice of highperformance networks sending communication in plaintext. We propose a security mechanism and provide metrics for analyzing both the security and performance costs.
On the Difficulty of Computations
, 1970
"... Two practical considerations concerning the use of computing machinery are the amount of information that must be given to the machine for it to perform a given task and the time it takes the machine to perform it. The size of programs and their running time are studied for mathematical models of co ..."
Abstract

Cited by 18 (4 self)
 Add to MetaCart
Two practical considerations concerning the use of computing machinery are the amount of information that must be given to the machine for it to perform a given task and the time it takes the machine to perform it. The size of programs and their running time are studied for mathematical models of computing machines. The study of the amount of information (i.e., number of bits) in a computer program needed for it to put out a given finite binary sequence leads to a definition of a random sequence; the random sequences of a given length are those that require the longest programs. The study of the running time of programs for computing infinite sets of natural numbers leads to an arithmetic of computers, which is a distributive lattice.