Simultaneous multithreading — put simply, the sharing of the execution resources of a superscalar processor between multiple execution threads — has recently become widespread via its introduction… (More)

We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation functions to be maximally secure against attacks using custom… (More)

The increasing frequency with which serious security flaws are discovered and the increasing rapidity with which they are exploited have made it necessary for programs to be updated far more… (More)

Given floating-point arithmetic with t-digit base-β significands in which all arithmetic operations are performed as if calculated to infinite precision and rounded to a nearest representable value,… (More)

This thesis consists of three parts, each of independent interest, yet tied together by the problem of matching with mismatches. In the first chapter, we present a motivated exposition of a new… (More)

We extend the work of Richard Crandall et al. to demonstrate how the Discrete Weighted Transform (DWT) can be applied to speed up multiplication modulo any number of the form a± b where ∏ p|ab p is… (More)

The products arising from the ozonolysis of oleic acid (cis-9-octadecenoic acid) in solution have been studied using negative ion mode electrospray ionization ion trap mass spectrometry. Oleic acid… (More)

With the present trend towards increased reliance upon computer systems, the provision and prompt application of security patches is becoming vital. Developers of all operating systems must generally… (More)

We describe a method for searching for ideal symmetric solutions to the Prouhet-Tarry-Escott Problem. We report results of extensive searches for solutions of sizes up to 12. We found two solutions… (More)