Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

64-bit computing

Known as: LP64, Native x86-64 Windows software, 64-bit OS 
In computer architecture, 64-bit computing is the use of processors that have datapath widths, integer size, and memory address widths of 64 bits… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
The article tells about the diversity of green spaces in London, the citizens’ attitude toward these spaces, and what Russian… Expand
  • table 1.1
  • table 2.1
  • table 2.2
  • table 2.3
  • table 2.4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Preface to the Third Edition List of Abbreviations 1 Introduction 1.1 Automatic Identification Systems 1.2 A Comparison of… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance… Expand
  • figure 2
  • figure 3
  • figure 4
  • table 2
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The Mips R10000 is a dynamic, superscalar microprocessor that implements the 64-bit Mips 4 instruction set architecture. It… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Abstract : This standard specifies a Secure Hash Algorithm (SHA-1) which can be used to generate a condensed representation of a… Expand
  • figure 1
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?