Arithmetic shift

Results: 38



#Item
1Bonus slides §  These are extra slides that used to be included in lecture notes, but have been moved to this, the “bonus” area to serve as a supplement.

Bonus slides §  These are extra slides that used to be included in lecture notes, but have been moved to this, the “bonus” area to serve as a supplement.

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2014-02-04 15:27:49
2ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-15 08:13:39
3Caesar Shifts Rock  1 by Ucaoimhu The beautiful Rocky Mountain landscape

Caesar Shifts Rock 1 by Ucaoimhu The beautiful Rocky Mountain landscape

Add to Reading List

Source URL: www.math.uchicago.edu

Language: English - Date: 2008-07-03 07:35:12
4Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 08:13:04
5EN164: Design of Computing Systems Lecture 10: Processor / ISA 3 Professor Sherief Reda http://scale.engin.brown.edu Electrical Sciences and Computer Engineering School of Engineering

EN164: Design of Computing Systems Lecture 10: Processor / ISA 3 Professor Sherief Reda http://scale.engin.brown.edu Electrical Sciences and Computer Engineering School of Engineering

Add to Reading List

Source URL: scale.engin.brown.edu

Language: English - Date: 2014-03-23 13:26:56
6IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 8, AUGUSTTABLE II OUR ATTACK COMPARED TO A GENERIC TIME/MEMORY/DATA TRADEOFF ATTACK

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
7Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-17 09:30:36
8

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:53
9INSTITUTE OF PHYSICS PUBLISHING  NANOTECHNOLOGY Nanotechnology[removed]–230

INSTITUTE OF PHYSICS PUBLISHING NANOTECHNOLOGY Nanotechnology[removed]–230

Add to Reading List

Source URL: www.cellmatrix.com

Language: English - Date: 2002-03-16 03:24:12
10A PRNG specialized in double precision floating point numbers using an affine transition Mutsuo Saito and Makoto Matsumoto  Abstract We propose a pseudorandom number generator specialized to

A PRNG specialized in double precision floating point numbers using an affine transition Mutsuo Saito and Makoto Matsumoto Abstract We propose a pseudorandom number generator specialized to

Add to Reading List

Source URL: www.math.sci.hiroshima-u.ac.jp

Language: English - Date: 2012-03-16 04:07:31